diff options
author | jmc <> | 2016-09-15 17:49:03 +0000 |
---|---|---|
committer | jmc <> | 2016-09-15 17:49:03 +0000 |
commit | c08b7528e442c942565b4fa5bc43e17adf44c939 (patch) | |
tree | 6b74fcd0b41ab147129fd68b17ec4982f7fba7cf /src | |
parent | eefb2f934eae206bc2a63b355ab70e79aaa9c92c (diff) | |
download | openbsd-c08b7528e442c942565b4fa5bc43e17adf44c939.tar.gz openbsd-c08b7528e442c942565b4fa5bc43e17adf44c939.tar.bz2 openbsd-c08b7528e442c942565b4fa5bc43e17adf44c939.zip |
shorten ts;
Diffstat (limited to 'src')
-rw-r--r-- | src/usr.bin/openssl/openssl.1 | 346 |
1 files changed, 63 insertions, 283 deletions
diff --git a/src/usr.bin/openssl/openssl.1 b/src/usr.bin/openssl/openssl.1 index df1b98940a..004839f448 100644 --- a/src/usr.bin/openssl/openssl.1 +++ b/src/usr.bin/openssl/openssl.1 | |||
@@ -1,4 +1,4 @@ | |||
1 | .\" $OpenBSD: openssl.1,v 1.71 2016/09/12 13:34:12 jmc Exp $ | 1 | .\" $OpenBSD: openssl.1,v 1.72 2016/09/15 17:49:03 jmc Exp $ |
2 | .\" ==================================================================== | 2 | .\" ==================================================================== |
3 | .\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. | 3 | .\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. |
4 | .\" | 4 | .\" |
@@ -112,7 +112,7 @@ | |||
112 | .\" | 112 | .\" |
113 | .\" OPENSSL | 113 | .\" OPENSSL |
114 | .\" | 114 | .\" |
115 | .Dd $Mdocdate: September 12 2016 $ | 115 | .Dd $Mdocdate: September 15 2016 $ |
116 | .Dt OPENSSL 1 | 116 | .Dt OPENSSL 1 |
117 | .Os | 117 | .Os |
118 | .Sh NAME | 118 | .Sh NAME |
@@ -355,7 +355,7 @@ and all certificates will be certified automatically. | |||
355 | .It Fl cert Ar file | 355 | .It Fl cert Ar file |
356 | The CA certificate file. | 356 | The CA certificate file. |
357 | .It Fl config Ar file | 357 | .It Fl config Ar file |
358 | Specifies the configuration file to use. | 358 | Specify an alternative configuration file. |
359 | .It Fl days Ar arg | 359 | .It Fl days Ar arg |
360 | The number of days to certify the certificate for. | 360 | The number of days to certify the certificate for. |
361 | .It Fl enddate Ar date | 361 | .It Fl enddate Ar date |
@@ -3263,9 +3263,6 @@ option, 0 is used for the serial number. | |||
3263 | The configuration options are specified in the | 3263 | The configuration options are specified in the |
3264 | .Qq req | 3264 | .Qq req |
3265 | section of the configuration file. | 3265 | section of the configuration file. |
3266 | As with all configuration files, if no value is specified in the specific | ||
3267 | section then the initial unnamed or default section is searched too. | ||
3268 | .Pp | ||
3269 | The options available are as follows: | 3266 | The options available are as follows: |
3270 | .Bl -tag -width "XXXX" | 3267 | .Bl -tag -width "XXXX" |
3271 | .It Cm attributes | 3268 | .It Cm attributes |
@@ -3378,7 +3375,7 @@ values from | |||
3378 | .It Cm utf8 | 3375 | .It Cm utf8 |
3379 | If set to | 3376 | If set to |
3380 | .Qq yes , | 3377 | .Qq yes , |
3381 | field values are interpreted as UTF8 strings, not ASCII. | 3378 | field values are interpreted as UTF8 strings. |
3382 | .It Cm x509_extensions | 3379 | .It Cm x509_extensions |
3383 | The configuration file section containing a list of | 3380 | The configuration file section containing a list of |
3384 | extensions to add to a certificate generated when the | 3381 | extensions to add to a certificate generated when the |
@@ -3386,7 +3383,7 @@ extensions to add to a certificate generated when the | |||
3386 | switch is used. | 3383 | switch is used. |
3387 | It can be overridden by the | 3384 | It can be overridden by the |
3388 | .Fl extensions | 3385 | .Fl extensions |
3389 | option. | 3386 | command line switch. |
3390 | .El | 3387 | .El |
3391 | .Pp | 3388 | .Pp |
3392 | There are two separate formats for the distinguished name and attribute | 3389 | There are two separate formats for the distinguished name and attribute |
@@ -3395,17 +3392,12 @@ If the | |||
3395 | .Fl prompt | 3392 | .Fl prompt |
3396 | option is set to | 3393 | option is set to |
3397 | .Qq no , | 3394 | .Qq no , |
3398 | the sections consist of just field names and values, | 3395 | then these sections just consist of field names and values. |
3399 | which allows external programs to generate a template file | 3396 | If the |
3400 | with all the field names and values and just pass it to | ||
3401 | .Nm req . | ||
3402 | .Pp | ||
3403 | Alternatively if the | ||
3404 | .Fl prompt | 3397 | .Fl prompt |
3405 | option is absent or not set to | 3398 | option is absent or not set to |
3406 | .Qq no , | 3399 | .Qq no , |
3407 | then the file contains field prompting information. | 3400 | then the file contains field prompting information of the form: |
3408 | It consists of lines of the form: | ||
3409 | .Bd -unfilled -offset indent | 3401 | .Bd -unfilled -offset indent |
3410 | fieldName="prompt" | 3402 | fieldName="prompt" |
3411 | fieldName_default="default field value" | 3403 | fieldName_default="default field value" |
@@ -4193,7 +4185,7 @@ The | |||
4193 | program processes the encoded version of the SSL session structure and | 4185 | program processes the encoded version of the SSL session structure and |
4194 | optionally prints out SSL session details | 4186 | optionally prints out SSL session details |
4195 | (for example the SSL session master key) | 4187 | (for example the SSL session master key) |
4196 | in human readable format. | 4188 | in human-readable format. |
4197 | .Pp | 4189 | .Pp |
4198 | The options are as follows: | 4190 | The options are as follows: |
4199 | .Bl -tag -width Ds | 4191 | .Bl -tag -width Ds |
@@ -4588,13 +4580,9 @@ Run | |||
4588 | .Ar number | 4580 | .Ar number |
4589 | benchmarks in parallel. | 4581 | benchmarks in parallel. |
4590 | .El | 4582 | .El |
4591 | .\" | ||
4592 | .\" TS | ||
4593 | .\" | ||
4594 | .Sh TS | 4583 | .Sh TS |
4595 | .nr nS 1 | 4584 | .nr nS 1 |
4596 | .Nm "openssl ts" | 4585 | .Nm "openssl ts" |
4597 | .Bk -words | ||
4598 | .Fl query | 4586 | .Fl query |
4599 | .Op Fl md4 | md5 | ripemd160 | sha1 | 4587 | .Op Fl md4 | md5 | ripemd160 | sha1 |
4600 | .Op Fl cert | 4588 | .Op Fl cert |
@@ -4606,12 +4594,10 @@ benchmarks in parallel. | |||
4606 | .Op Fl out Ar request.tsq | 4594 | .Op Fl out Ar request.tsq |
4607 | .Op Fl policy Ar object_id | 4595 | .Op Fl policy Ar object_id |
4608 | .Op Fl text | 4596 | .Op Fl text |
4609 | .Ek | ||
4610 | .nr nS 0 | 4597 | .nr nS 0 |
4611 | .Pp | 4598 | .Pp |
4612 | .nr nS 1 | 4599 | .nr nS 1 |
4613 | .Nm "openssl ts" | 4600 | .Nm "openssl ts" |
4614 | .Bk -words | ||
4615 | .Fl reply | 4601 | .Fl reply |
4616 | .Op Fl chain Ar certs_file.pem | 4602 | .Op Fl chain Ar certs_file.pem |
4617 | .Op Fl config Ar configfile | 4603 | .Op Fl config Ar configfile |
@@ -4626,12 +4612,10 @@ benchmarks in parallel. | |||
4626 | .Op Fl text | 4612 | .Op Fl text |
4627 | .Op Fl token_in | 4613 | .Op Fl token_in |
4628 | .Op Fl token_out | 4614 | .Op Fl token_out |
4629 | .Ek | ||
4630 | .nr nS 0 | 4615 | .nr nS 0 |
4631 | .Pp | 4616 | .Pp |
4632 | .nr nS 1 | 4617 | .nr nS 1 |
4633 | .Nm "openssl ts" | 4618 | .Nm "openssl ts" |
4634 | .Bk -words | ||
4635 | .Fl verify | 4619 | .Fl verify |
4636 | .Op Fl CAfile Ar trusted_certs.pem | 4620 | .Op Fl CAfile Ar trusted_certs.pem |
4637 | .Op Fl CApath Ar trusted_cert_path | 4621 | .Op Fl CApath Ar trusted_cert_path |
@@ -4641,7 +4625,6 @@ benchmarks in parallel. | |||
4641 | .Op Fl queryfile Ar request.tsq | 4625 | .Op Fl queryfile Ar request.tsq |
4642 | .Op Fl token_in | 4626 | .Op Fl token_in |
4643 | .Op Fl untrusted Ar cert_file.pem | 4627 | .Op Fl untrusted Ar cert_file.pem |
4644 | .Ek | ||
4645 | .nr nS 0 | 4628 | .nr nS 0 |
4646 | .Pp | 4629 | .Pp |
4647 | The | 4630 | The |
@@ -4649,7 +4632,7 @@ The | |||
4649 | command is a basic Time Stamping Authority (TSA) client and server | 4632 | command is a basic Time Stamping Authority (TSA) client and server |
4650 | application as specified in RFC 3161 (Time-Stamp Protocol, TSP). | 4633 | application as specified in RFC 3161 (Time-Stamp Protocol, TSP). |
4651 | A TSA can be part of a PKI deployment and its role is to provide long | 4634 | A TSA can be part of a PKI deployment and its role is to provide long |
4652 | term proof of the existence of a certain datum before a particular time. | 4635 | term proof of the existence of specific data. |
4653 | Here is a brief description of the protocol: | 4636 | Here is a brief description of the protocol: |
4654 | .Bl -enum | 4637 | .Bl -enum |
4655 | .It | 4638 | .It |
@@ -4688,35 +4671,23 @@ switch can be used for creating and printing a time stamp | |||
4688 | request with the following options: | 4671 | request with the following options: |
4689 | .Bl -tag -width Ds | 4672 | .Bl -tag -width Ds |
4690 | .It Fl cert | 4673 | .It Fl cert |
4691 | The TSA is expected to include its signing certificate in the | 4674 | Expect the TSA to include its signing certificate in the response. |
4692 | response. | ||
4693 | .It Fl config Ar configfile | 4675 | .It Fl config Ar configfile |
4694 | The configuration file to use. | 4676 | Specify an alternative configuration file. |
4695 | This option overrides the | 4677 | Only the OID section is used. |
4696 | .Ev OPENSSL_CONF | ||
4697 | environment variable. | ||
4698 | Only the OID section of the config file is used with the | ||
4699 | .Fl query | ||
4700 | command. | ||
4701 | .It Fl data Ar file_to_hash | 4678 | .It Fl data Ar file_to_hash |
4702 | The data file for which the time stamp request needs to be created. | 4679 | The data file for which the time stamp request needs to be created. |
4703 | stdin is the default if neither the | 4680 | The default is standard input. |
4704 | .Fl data | ||
4705 | nor the | ||
4706 | .Fl digest | ||
4707 | option is specified. | ||
4708 | .It Fl digest Ar digest_bytes | 4681 | .It Fl digest Ar digest_bytes |
4709 | It is possible to specify the message imprint explicitly without the data | 4682 | Specify the message imprint explicitly without the data file. |
4710 | file. | ||
4711 | The imprint must be specified in a hexadecimal format, | 4683 | The imprint must be specified in a hexadecimal format, |
4712 | two characters per byte, | 4684 | two characters per byte, |
4713 | the bytes optionally separated by colons (e.g. 1A:F6:01:... or 1AF601...). | 4685 | the bytes optionally separated by colons. |
4714 | The number of bytes must match the message digest algorithm in use. | 4686 | The number of bytes must match the message digest algorithm in use. |
4715 | .It Fl in Ar request.tsq | 4687 | .It Fl in Ar request.tsq |
4716 | This option specifies a previously created time stamp request in DER | 4688 | A previously created time stamp request in DER |
4717 | format that will be printed into the output file. | 4689 | format that will be printed into the output file. |
4718 | Useful when you need to examine the content of a request in human-readable | 4690 | Useful for examining the content of a request in human-readable format. |
4719 | format. | ||
4720 | .It Fl md4|md5|ripemd160|sha|sha1 | 4691 | .It Fl md4|md5|ripemd160|sha|sha1 |
4721 | The message digest to apply to the data file. | 4692 | The message digest to apply to the data file. |
4722 | It supports all the message digest algorithms that are supported by the | 4693 | It supports all the message digest algorithms that are supported by the |
@@ -4724,23 +4695,20 @@ It supports all the message digest algorithms that are supported by the | |||
4724 | command. | 4695 | command. |
4725 | The default is SHA-1. | 4696 | The default is SHA-1. |
4726 | .It Fl no_nonce | 4697 | .It Fl no_nonce |
4727 | No nonce is specified in the request if this option is given. | 4698 | Specify no nonce in the request. |
4728 | Otherwise a 64-bit long pseudo-random none is | 4699 | The default, to include a 64-bit long pseudo-random nonce, |
4729 | included in the request. | 4700 | is recommended to protect against replay attacks. |
4730 | It is recommended to use nonce to protect against replay-attacks. | ||
4731 | .It Fl out Ar request.tsq | 4701 | .It Fl out Ar request.tsq |
4732 | Name of the output file to which the request will be written. | 4702 | The output file to write to, |
4733 | The default is stdout. | 4703 | or standard output if not specified. |
4734 | .It Fl policy Ar object_id | 4704 | .It Fl policy Ar object_id |
4735 | The policy that the client expects the TSA to use for creating the | 4705 | The policy that the client expects the TSA to use for creating the |
4736 | time stamp token. | 4706 | time stamp token. |
4737 | Either the dotted OID notation or OID names defined | 4707 | Either dotted OID notation or OID names defined |
4738 | in the config file can be used. | 4708 | in the config file can be used. |
4739 | If no policy is requested the TSA will | 4709 | If no policy is requested the TSA uses its own default policy. |
4740 | use its own default policy. | ||
4741 | .It Fl text | 4710 | .It Fl text |
4742 | If this option is specified the output is in human-readable text format | 4711 | Output in human-readable text format instead of DER. |
4743 | instead of DER. | ||
4744 | .El | 4712 | .El |
4745 | .Pp | 4713 | .Pp |
4746 | A time stamp response (TimeStampResp) consists of a response status | 4714 | A time stamp response (TimeStampResp) consists of a response status |
@@ -4757,7 +4725,7 @@ is not specified the output is always a time stamp response (TimeStampResp), | |||
4757 | otherwise it is a time stamp token (ContentInfo). | 4725 | otherwise it is a time stamp token (ContentInfo). |
4758 | .Bl -tag -width Ds | 4726 | .Bl -tag -width Ds |
4759 | .It Fl chain Ar certs_file.pem | 4727 | .It Fl chain Ar certs_file.pem |
4760 | The collection of certificates, in PEM format, | 4728 | The collection of PEM certificates |
4761 | that will be included in the response | 4729 | that will be included in the response |
4762 | in addition to the signer certificate if the | 4730 | in addition to the signer certificate if the |
4763 | .Fl cert | 4731 | .Fl cert |
@@ -4768,24 +4736,18 @@ The | |||
4768 | .Fl reply | 4736 | .Fl reply |
4769 | command does not build a certificate chain automatically. | 4737 | command does not build a certificate chain automatically. |
4770 | .It Fl config Ar configfile | 4738 | .It Fl config Ar configfile |
4771 | The configuration file to use. | 4739 | Specify an alternative configuration file. |
4772 | This option overrides the | ||
4773 | .Ev OPENSSL_CONF | ||
4774 | environment variable. | ||
4775 | See | ||
4776 | .Sx TS CONFIGURATION FILE OPTIONS | ||
4777 | for configurable variables. | ||
4778 | .It Fl in Ar response.tsr | 4740 | .It Fl in Ar response.tsr |
4779 | Specifies a previously created time stamp response or time stamp token, if | 4741 | Specify a previously created time stamp response (or time stamp token, if |
4780 | .Fl token_in | 4742 | .Fl token_in |
4781 | is also specified, | 4743 | is also specified) |
4782 | in DER format that will be written to the output file. | 4744 | in DER format that will be written to the output file. |
4783 | This option does not require a request; | 4745 | This option does not require a request; |
4784 | it is useful, for example, | 4746 | it is useful, for example, |
4785 | when you need to examine the content of a response or token | 4747 | to examine the content of a response or token |
4786 | or you want to extract the time stamp token from a response. | 4748 | or to extract the time stamp token from a response. |
4787 | If the input is a token and the output is a time stamp response a default | 4749 | If the input is a token and the output is a time stamp response a default |
4788 | .Dq granted | 4750 | .Qq granted |
4789 | status info is added to the token. | 4751 | status info is added to the token. |
4790 | .It Fl inkey Ar private.pem | 4752 | .It Fl inkey Ar private.pem |
4791 | The signer private key of the TSA in PEM format. | 4753 | The signer private key of the TSA in PEM format. |
@@ -4802,22 +4764,16 @@ The default is stdout. | |||
4802 | .It Fl passin Ar arg | 4764 | .It Fl passin Ar arg |
4803 | The key password source. | 4765 | The key password source. |
4804 | .It Fl policy Ar object_id | 4766 | .It Fl policy Ar object_id |
4805 | The default policy to use for the response unless the client | 4767 | The default policy to use for the response. |
4806 | explicitly requires a particular TSA policy. | 4768 | Either dotted OID notation or OID names defined |
4807 | The OID can be specified either in dotted notation or with its name. | 4769 | in the config file can be used. |
4808 | Overrides the | 4770 | If no policy is requested the TSA uses its own default policy. |
4809 | .Cm default_policy | ||
4810 | config file option. | ||
4811 | .It Fl queryfile Ar request.tsq | 4771 | .It Fl queryfile Ar request.tsq |
4812 | The name of the file containing a DER-encoded time stamp request. | 4772 | The file containing a DER-encoded time stamp request. |
4813 | .It Fl section Ar tsa_section | 4773 | .It Fl section Ar tsa_section |
4814 | The name of the config file section containing the settings for the | 4774 | The config file section containing the settings for response generation. |
4815 | response generation. | ||
4816 | If not specified the default TSA section is used; see | ||
4817 | .Sx TS CONFIGURATION FILE OPTIONS | ||
4818 | for details. | ||
4819 | .It Fl signer Ar tsa_cert.pem | 4775 | .It Fl signer Ar tsa_cert.pem |
4820 | The signer certificate of the TSA in PEM format. | 4776 | The PEM signer certificate of the TSA. |
4821 | The TSA signing certificate must have exactly one extended key usage | 4777 | The TSA signing certificate must have exactly one extended key usage |
4822 | assigned to it: timeStamping. | 4778 | assigned to it: timeStamping. |
4823 | The extended key usage must also be critical, | 4779 | The extended key usage must also be critical, |
@@ -4826,16 +4782,13 @@ Overrides the | |||
4826 | .Cm signer_cert | 4782 | .Cm signer_cert |
4827 | variable of the config file. | 4783 | variable of the config file. |
4828 | .It Fl text | 4784 | .It Fl text |
4829 | If this option is specified the output is human-readable text format | 4785 | Output in human-readable text format instead of DER. |
4830 | instead of DER. | ||
4831 | .It Fl token_in | 4786 | .It Fl token_in |
4832 | This flag can be used together with the | 4787 | The input is a DER-encoded time stamp token (ContentInfo) |
4833 | .Fl in | 4788 | instead of a time stamp response (TimeStampResp). |
4834 | option and indicates that the input is a DER-encoded time stamp token | ||
4835 | (ContentInfo) instead of a time stamp response (TimeStampResp). | ||
4836 | .It Fl token_out | 4789 | .It Fl token_out |
4837 | The output is a time stamp token (ContentInfo) instead of time stamp | 4790 | The output is a time stamp token (ContentInfo) |
4838 | response (TimeStampResp). | 4791 | instead of a time stamp response (TimeStampResp). |
4839 | .El | 4792 | .El |
4840 | .Pp | 4793 | .Pp |
4841 | The | 4794 | The |
@@ -4847,18 +4800,16 @@ The | |||
4847 | command does not use the configuration file. | 4800 | command does not use the configuration file. |
4848 | .Bl -tag -width Ds | 4801 | .Bl -tag -width Ds |
4849 | .It Fl CAfile Ar trusted_certs.pem | 4802 | .It Fl CAfile Ar trusted_certs.pem |
4850 | The name of the file containing a set of trusted self-signed CA | 4803 | The file containing a set of trusted self-signed PEM CA certificates. |
4851 | certificates in PEM format. | 4804 | See |
4852 | See the similar option of | ||
4853 | .Nm verify | 4805 | .Nm verify |
4854 | for additional details. | 4806 | for additional details. |
4855 | Either this option or | 4807 | Either this option or |
4856 | .Fl CApath | 4808 | .Fl CApath |
4857 | must be specified. | 4809 | must be specified. |
4858 | .It Fl CApath Ar trusted_cert_path | 4810 | .It Fl CApath Ar trusted_cert_path |
4859 | The name of the directory containing the trused CA certificates of the | 4811 | The directory containing the trused CA certificates of the client. |
4860 | client. | 4812 | See |
4861 | See the similar option of | ||
4862 | .Nm verify | 4813 | .Nm verify |
4863 | for additional details. | 4814 | for additional details. |
4864 | Either this option or | 4815 | Either this option or |
@@ -4894,42 +4845,24 @@ and | |||
4894 | .Fl digest | 4845 | .Fl digest |
4895 | options must not be specified with this one. | 4846 | options must not be specified with this one. |
4896 | .It Fl token_in | 4847 | .It Fl token_in |
4897 | This flag can be used together with the | 4848 | The input is a DER-encoded time stamp token (ContentInfo) |
4898 | .Fl in | 4849 | instead of a time stamp response (TimeStampResp). |
4899 | option and indicates that the input is a DER-encoded time stamp token | ||
4900 | (ContentInfo) instead of a time stamp response (TimeStampResp). | ||
4901 | .It Fl untrusted Ar cert_file.pem | 4850 | .It Fl untrusted Ar cert_file.pem |
4902 | Set of additional untrusted certificates in PEM format which may be | 4851 | Additional untrusted PEM certificates which may be needed |
4903 | needed when building the certificate chain for the TSA's signing | 4852 | when building the certificate chain for the TSA's signing certificate. |
4904 | certificate. | ||
4905 | This file must contain the TSA signing certificate and | 4853 | This file must contain the TSA signing certificate and |
4906 | all intermediate CA certificates unless the response includes them. | 4854 | all intermediate CA certificates unless the response includes them. |
4907 | .El | 4855 | .El |
4908 | .Sh TS CONFIGURATION FILE OPTIONS | ||
4909 | The | ||
4910 | .Fl query | ||
4911 | and | ||
4912 | .Fl reply | ||
4913 | options make use of a configuration file defined by the | ||
4914 | .Ev OPENSSL_CONF | ||
4915 | environment variable. | ||
4916 | The | ||
4917 | .Fl query | ||
4918 | option uses only the symbolic OID names section | ||
4919 | and it can work without it. | ||
4920 | However, the | ||
4921 | .Fl reply | ||
4922 | option needs the config file for its operation. | ||
4923 | .Pp | 4856 | .Pp |
4924 | When there is a command line switch equivalent of a variable the | 4857 | Options specified on the command line always override |
4925 | switch always overrides the settings in the config file. | 4858 | the settings in the config file: |
4926 | .Bl -tag -width Ds | 4859 | .Bl -tag -width Ds |
4927 | .It Cm tsa Ar section , Cm default_tsa | 4860 | .It Cm tsa Ar section , Cm default_tsa |
4928 | This is the main section and it specifies the name of another section | 4861 | This is the main section and it specifies the name of another section |
4929 | that contains all the options for the | 4862 | that contains all the options for the |
4930 | .Fl reply | 4863 | .Fl reply |
4931 | option. | 4864 | option. |
4932 | This default section can be overridden with the | 4865 | This section can be overridden with the |
4933 | .Fl section | 4866 | .Fl section |
4934 | command line switch. | 4867 | command line switch. |
4935 | .It Cm oid_file | 4868 | .It Cm oid_file |
@@ -4941,11 +4874,11 @@ See | |||
4941 | .Nm ca | 4874 | .Nm ca |
4942 | for a description. | 4875 | for a description. |
4943 | .It Cm serial | 4876 | .It Cm serial |
4944 | The name of the file containing the hexadecimal serial number of the | 4877 | The file containing the hexadecimal serial number of the |
4945 | last time stamp response created. | 4878 | last time stamp response created. |
4946 | This number is incremented by 1 for each response. | 4879 | This number is incremented by 1 for each response. |
4947 | If the file does not exist at the time of response | 4880 | If the file does not exist at the time of response generation |
4948 | generation a new file is created with serial number 1. | 4881 | a new file is created with serial number 1. |
4949 | This parameter is mandatory. | 4882 | This parameter is mandatory. |
4950 | .It Cm signer_cert | 4883 | .It Cm signer_cert |
4951 | TSA signing certificate, in PEM format. | 4884 | TSA signing certificate, in PEM format. |
@@ -4953,7 +4886,7 @@ The same as the | |||
4953 | .Fl signer | 4886 | .Fl signer |
4954 | command line option. | 4887 | command line option. |
4955 | .It Cm certs | 4888 | .It Cm certs |
4956 | A file containing a set of PEM-encoded certificates that need to be | 4889 | A set of PEM-encoded certificates that need to be |
4957 | included in the response. | 4890 | included in the response. |
4958 | The same as the | 4891 | The same as the |
4959 | .Fl chain | 4892 | .Fl chain |
@@ -4982,10 +4915,10 @@ For example, secs:1, millisecs:500, microsecs:100. | |||
4982 | If any of the components is missing, | 4915 | If any of the components is missing, |
4983 | zero is assumed for that field. | 4916 | zero is assumed for that field. |
4984 | .It Cm clock_precision_digits | 4917 | .It Cm clock_precision_digits |
4985 | Specifies the maximum number of digits, which represent the fraction of | 4918 | The maximum number of digits, which represent the fraction of seconds, |
4986 | seconds, that need to be included in the time field. | 4919 | that need to be included in the time field. |
4987 | The trailing zeroes must be removed from the time, | 4920 | The trailing zeroes must be removed from the time, |
4988 | so there might actually be fewer digits, | 4921 | so there might actually be fewer digits |
4989 | or no fraction of seconds at all. | 4922 | or no fraction of seconds at all. |
4990 | The maximum value is 6; | 4923 | The maximum value is 6; |
4991 | the default is 0. | 4924 | the default is 0. |
@@ -5013,159 +4946,6 @@ If this variable is set to no, | |||
5013 | only the signing certificate identifier is included. | 4946 | only the signing certificate identifier is included. |
5014 | The default is no. | 4947 | The default is no. |
5015 | .El | 4948 | .El |
5016 | .Sh TS ENVIRONMENT VARIABLES | ||
5017 | .Ev OPENSSL_CONF | ||
5018 | contains the path of the configuration file and can be | ||
5019 | overridden by the | ||
5020 | .Fl config | ||
5021 | command line option. | ||
5022 | .Sh TS EXAMPLES | ||
5023 | All the examples below presume that | ||
5024 | .Ev OPENSSL_CONF | ||
5025 | is set to a proper configuration file, | ||
5026 | e.g. the example configuration file | ||
5027 | .Pa openssl/apps/openssl.cnf | ||
5028 | will do. | ||
5029 | .Pp | ||
5030 | To create a time stamp request for design1.txt with SHA-1 | ||
5031 | without nonce and policy and no certificate is required in the response: | ||
5032 | .Bd -literal -offset indent | ||
5033 | $ openssl ts -query -data design1.txt -no_nonce \e | ||
5034 | -out design1.tsq | ||
5035 | .Ed | ||
5036 | .Pp | ||
5037 | To create a similar time stamp request but specifying the message imprint | ||
5038 | explicitly: | ||
5039 | .Bd -literal -offset indent | ||
5040 | $ openssl ts -query \e | ||
5041 | -digest b7e5d3f93198b38379852f2c04e78d73abdd0f4b \e | ||
5042 | -no_nonce -out design1.tsq | ||
5043 | .Ed | ||
5044 | .Pp | ||
5045 | To print the content of the previous request in human readable format: | ||
5046 | .Bd -literal -offset indent | ||
5047 | $ openssl ts -query -in design1.tsq -text | ||
5048 | .Ed | ||
5049 | .Pp | ||
5050 | To create a time stamp request which includes the MD5 digest | ||
5051 | of design2.txt, requests the signer certificate and nonce, | ||
5052 | specifies a policy ID | ||
5053 | (assuming the tsa_policy1 name is defined in the | ||
5054 | OID section of the config file): | ||
5055 | .Bd -literal -offset indent | ||
5056 | $ openssl ts -query -data design2.txt -md5 \e | ||
5057 | -policy tsa_policy1 -cert -out design2.tsq | ||
5058 | .Ed | ||
5059 | .Pp | ||
5060 | Before generating a response, | ||
5061 | a signing certificate must be created for the TSA that contains the | ||
5062 | .Cm timeStamping | ||
5063 | critical extended key usage extension | ||
5064 | without any other key usage extensions. | ||
5065 | You can add the | ||
5066 | .Dq extendedKeyUsage = critical,timeStamping | ||
5067 | line to the user certificate section | ||
5068 | of the config file to generate a proper certificate. | ||
5069 | See the | ||
5070 | .Nm req , | ||
5071 | .Nm ca , | ||
5072 | and | ||
5073 | .Nm x509 | ||
5074 | commands for instructions. | ||
5075 | The examples below assume that cacert.pem contains the certificate of the CA, | ||
5076 | tsacert.pem is the signing certificate issued by cacert.pem and | ||
5077 | tsakey.pem is the private key of the TSA. | ||
5078 | .Pp | ||
5079 | To create a time stamp response for a request: | ||
5080 | .Bd -literal -offset indent | ||
5081 | $ openssl ts -reply -queryfile design1.tsq -inkey tsakey.pem \e | ||
5082 | -signer tsacert.pem -out design1.tsr | ||
5083 | .Ed | ||
5084 | .Pp | ||
5085 | If you want to use the settings in the config file you could just write: | ||
5086 | .Bd -literal -offset indent | ||
5087 | $ openssl ts -reply -queryfile design1.tsq -out design1.tsr | ||
5088 | .Ed | ||
5089 | .Pp | ||
5090 | To print a time stamp reply to stdout in human readable format: | ||
5091 | .Bd -literal -offset indent | ||
5092 | $ openssl ts -reply -in design1.tsr -text | ||
5093 | .Ed | ||
5094 | .Pp | ||
5095 | To create a time stamp token instead of time stamp response: | ||
5096 | .Bd -literal -offset indent | ||
5097 | $ openssl ts -reply -queryfile design1.tsq \e | ||
5098 | -out design1_token.der -token_out | ||
5099 | .Ed | ||
5100 | .Pp | ||
5101 | To print a time stamp token to stdout in human readable format: | ||
5102 | .Bd -literal -offset indent | ||
5103 | $ openssl ts -reply -in design1_token.der -token_in \e | ||
5104 | -text -token_out | ||
5105 | .Ed | ||
5106 | .Pp | ||
5107 | To extract the time stamp token from a response: | ||
5108 | .Bd -literal -offset indent | ||
5109 | $ openssl ts -reply -in design1.tsr -out design1_token.der \e | ||
5110 | -token_out | ||
5111 | .Ed | ||
5112 | .Pp | ||
5113 | To add | ||
5114 | .Dq granted | ||
5115 | status info to a time stamp token thereby creating a valid response: | ||
5116 | .Bd -literal -offset indent | ||
5117 | $ openssl ts -reply -in design1_token.der \e | ||
5118 | -token_in -out design1.tsr | ||
5119 | .Ed | ||
5120 | .Pp | ||
5121 | To verify a time stamp reply against a request: | ||
5122 | .Bd -literal -offset indent | ||
5123 | $ openssl ts -verify -queryfile design1.tsq -in design1.tsr \e | ||
5124 | -CAfile cacert.pem -untrusted tsacert.pem | ||
5125 | .Ed | ||
5126 | .Pp | ||
5127 | To verify a time stamp reply that includes the certificate chain: | ||
5128 | .Bd -literal -offset indent | ||
5129 | $ openssl ts -verify -queryfile design2.tsq -in design2.tsr \e | ||
5130 | -CAfile cacert.pem | ||
5131 | .Ed | ||
5132 | .Pp | ||
5133 | To verify a time stamp token against the original data file: | ||
5134 | .Bd -literal -offset indent | ||
5135 | $ openssl ts -verify -data design2.txt -in design2.tsr \e | ||
5136 | -CAfile cacert.pem | ||
5137 | .Ed | ||
5138 | .Pp | ||
5139 | To verify a time stamp token against a message imprint: | ||
5140 | .Bd -literal -offset indent | ||
5141 | $ openssl ts -verify \e | ||
5142 | -digest b7e5d3f93198b38379852f2c04e78d73abdd0f4b \e | ||
5143 | -in design2.tsr -CAfile cacert.pem | ||
5144 | .Ed | ||
5145 | .Sh TS BUGS | ||
5146 | No support for time stamps over SMTP, though it is quite easy | ||
5147 | to implement an automatic email-based TSA with | ||
5148 | .Xr procmail | ||
5149 | and | ||
5150 | .Xr perl 1 . | ||
5151 | Pure TCP/IP is not supported. | ||
5152 | .Pp | ||
5153 | The file containing the last serial number of the TSA is not | ||
5154 | locked when being read or written. | ||
5155 | This is a problem if more than one instance of | ||
5156 | .Nm OpenSSL | ||
5157 | is trying to create a time stamp | ||
5158 | response at the same time. | ||
5159 | .Pp | ||
5160 | Look for the FIXME word in the source files. | ||
5161 | .Pp | ||
5162 | The source code should really be reviewed by somebody else, too. | ||
5163 | .Pp | ||
5164 | More testing is needed. | ||
5165 | .Sh TS AUTHORS | ||
5166 | .An Zoltan Glozik Aq Mt zglozik@opentsa.org , | ||
5167 | OpenTSA project | ||
5168 | .Pq Lk http://www.opentsa.org . | ||
5169 | .\" | 4949 | .\" |
5170 | .\" SPKAC | 4950 | .\" SPKAC |
5171 | .\" | 4951 | .\" |