summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--src/usr.bin/openssl/openssl.1105
1 files changed, 82 insertions, 23 deletions
diff --git a/src/usr.bin/openssl/openssl.1 b/src/usr.bin/openssl/openssl.1
index 4af738e12a..c46c18e166 100644
--- a/src/usr.bin/openssl/openssl.1
+++ b/src/usr.bin/openssl/openssl.1
@@ -1,4 +1,4 @@
1.\" $OpenBSD: openssl.1,v 1.90 2018/03/30 20:38:23 schwarze Exp $ 1.\" $OpenBSD: openssl.1,v 1.91 2018/03/30 23:03:31 schwarze Exp $
2.\" ==================================================================== 2.\" ====================================================================
3.\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved. 3.\" Copyright (c) 1998-2002 The OpenSSL Project. All rights reserved.
4.\" 4.\"
@@ -300,6 +300,7 @@ into a nested structure.
300.Op Fl batch 300.Op Fl batch
301.Op Fl cert Ar file 301.Op Fl cert Ar file
302.Op Fl config Ar file 302.Op Fl config Ar file
303.Op Fl create_serial
303.Op Fl crl_CA_compromise Ar time 304.Op Fl crl_CA_compromise Ar time
304.Op Fl crl_compromise Ar time 305.Op Fl crl_compromise Ar time
305.Op Fl crl_hold Ar instruction 306.Op Fl crl_hold Ar instruction
@@ -314,11 +315,12 @@ into a nested structure.
314.Op Fl gencrl 315.Op Fl gencrl
315.Op Fl in Ar file 316.Op Fl in Ar file
316.Op Fl infiles 317.Op Fl infiles
317.Op Fl key Ar keyfile 318.Op Fl key Ar password
318.Op Fl keyfile Ar arg 319.Op Fl keyfile Ar arg
319.Op Fl keyform Ar pem 320.Op Fl keyform Cm pem | der
320.Op Fl md Ar arg 321.Op Fl md Ar arg
321.Op Fl msie_hack 322.Op Fl msie_hack
323.Op Fl multivalue\-rdn
322.Op Fl name Ar section 324.Op Fl name Ar section
323.Op Fl noemailDN 325.Op Fl noemailDN
324.Op Fl notext 326.Op Fl notext
@@ -328,12 +330,14 @@ into a nested structure.
328.Op Fl policy Ar arg 330.Op Fl policy Ar arg
329.Op Fl preserveDN 331.Op Fl preserveDN
330.Op Fl revoke Ar file 332.Op Fl revoke Ar file
333.Op Fl selfsign
331.Op Fl spkac Ar file 334.Op Fl spkac Ar file
332.Op Fl ss_cert Ar file 335.Op Fl ss_cert Ar file
333.Op Fl startdate Ar date 336.Op Fl startdate Ar date
334.Op Fl status Ar serial 337.Op Fl status Ar serial
335.Op Fl subj Ar arg 338.Op Fl subj Ar arg
336.Op Fl updatedb 339.Op Fl updatedb
340.Op Fl utf8
337.Op Fl verbose 341.Op Fl verbose
338.nr nS 0 342.nr nS 0
339.Pp 343.Pp
@@ -354,6 +358,10 @@ and all certificates will be certified automatically.
354The CA certificate file. 358The CA certificate file.
355.It Fl config Ar file 359.It Fl config Ar file
356Specify an alternative configuration file. 360Specify an alternative configuration file.
361.It Fl create_serial
362If reading the serial from the text file as specified in the
363configuration fails, create a new random serial to be used as the
364next serial number.
357.It Fl days Ar arg 365.It Fl days Ar arg
358The number of days to certify the certificate for. 366The number of days to certify the certificate for.
359.It Fl enddate Ar date 367.It Fl enddate Ar date
@@ -371,6 +379,9 @@ If no extension section is present, a V1 certificate is created.
371If the extension section is present 379If the extension section is present
372.Pq even if it is empty , 380.Pq even if it is empty ,
373then a V3 certificate is created. 381then a V3 certificate is created.
382See the
383.Xr x509v3.cnf 5
384manual page for details of the extension section format.
374.It Fl extfile Ar file 385.It Fl extfile Ar file
375An additional configuration 386An additional configuration
376.Ar file 387.Ar file
@@ -385,14 +396,18 @@ containing a single certificate request to be signed by the CA.
385.It Fl infiles 396.It Fl infiles
386If present, this should be the last option; all subsequent arguments 397If present, this should be the last option; all subsequent arguments
387are assumed to be the names of files containing certificate requests. 398are assumed to be the names of files containing certificate requests.
388.It Fl key Ar keyfile 399.It Fl key Ar password
389The password used to encrypt the private key. 400The
401.Fa password
402used to encrypt the private key.
390Since on some systems the command line arguments are visible, 403Since on some systems the command line arguments are visible,
391this option should be used with caution. 404this option should be used with caution.
392.It Fl keyfile Ar file 405.It Fl keyfile Ar file
393The private key to sign requests with. 406The private key to sign requests with.
394.It Fl keyform Ar pem 407.It Fl keyform Cm pem | der
395Private key file format. 408Private key file format.
409The default is
410.Cm pem .
396.It Fl md Ar alg 411.It Fl md Ar alg
397The message digest to use. 412The message digest to use.
398Possible values include 413Possible values include
@@ -411,6 +426,16 @@ its use is strongly discouraged.
411The newer control 426The newer control
412.Qq Xenroll 427.Qq Xenroll
413does not need this option. 428does not need this option.
429.It Fl multivalue\-rdn
430This option causes the
431.Fl subj
432argument to be interpreted with full support for multivalued RDNs,
433for example
434.Qq "/DC=org/DC=OpenSSL/DC=users/UID=123456+CN=John Doe" .
435If
436.Fl multivalue\-rdn
437is not used, the UID value is set to
438.Qq "123456+CN=John Doe" .
414.It Fl name Ar section 439.It Fl name Ar section
415Specifies the configuration file 440Specifies the configuration file
416.Ar section 441.Ar section
@@ -435,7 +460,10 @@ Don't output the text form of a certificate to the output file.
435.It Fl out Ar file 460.It Fl out Ar file
436The output file to output certificates to. 461The output file to output certificates to.
437The default is standard output. 462The default is standard output.
438The certificate details will also be printed out to this file. 463The certificate details will also be printed out to this file in
464PEM format, except that
465.Fl spkac
466outputs DER format.
439.It Fl outdir Ar directory 467.It Fl outdir Ar directory
440The 468The
441.Ar directory 469.Ar directory
@@ -472,6 +500,27 @@ This is largely for compatibility with the older IE enrollment control
472which would only accept certificates if their DNs matched the order of the 500which would only accept certificates if their DNs matched the order of the
473request. 501request.
474This is not needed for Xenroll. 502This is not needed for Xenroll.
503.It Fl selfsign
504Indicates the issued certificates are to be signed with the key the
505certificate requests were signed with, given with
506.Fl keyfile .
507Certificate requests signed with a different key are ignored.
508If
509.Fl gencrl ,
510.Fl spkac ,
511or
512.Fl ss_cert
513are given,
514.Fl selfsign
515is ignored.
516.Pp
517A consequence of using
518.Fl selfsign
519is that the self-signed certificate appears among the entries in
520the certificate database (see the configuration option
521.Cm database )
522and uses the same serial number counter as all other certificates
523signed with the self-signed certificate.
475.It Fl spkac Ar file 524.It Fl spkac Ar file
476A file containing a single Netscape signed public key and challenge, 525A file containing a single Netscape signed public key and challenge,
477and additional field values to be signed by the CA. 526and additional field values to be signed by the CA.
@@ -492,11 +541,23 @@ A single self-signed certificate to be signed by the CA.
492Set the start date. 541Set the start date.
493The format of the date is [YY]YYMMDDHHMMSSZ, 542The format of the date is [YY]YYMMDDHHMMSSZ,
494with all four year digits required for dates from 2050 onwards. 543with all four year digits required for dates from 2050 onwards.
495.It Fl status Ar serial 544.It Fl subj Ar arg
496Show the status of the certificate with serial number 545Supersedes the subject name given in the request.
497.Ar serial . 546The
498.It Fl updatedb 547.Ar arg
499Update database for expired certificates. 548must be formatted as
549.Sm off
550.Pf / Ar type0 Ns = Ar value0 Ns / Ar type 1 Ns = Ar value 1 Ns /
551.Ar type2 Ns = Ar ... ;
552.Sm on
553characters may be escaped by
554.Sq \e
555.Pq backslash ,
556no spaces are skipped.
557.It Fl utf8
558Interpret field values read from a terminal or obtained from a
559configuration file as UTF-8 strings.
560By default, they are interpreted as ASCII.
500.It Fl verbose 561.It Fl verbose
501Print extra details about the operations being performed. 562Print extra details about the operations being performed.
502.El 563.El
@@ -547,6 +608,9 @@ if the CRL extension section is present
547then a V2 CRL is created. 608then a V2 CRL is created.
548The CRL extensions specified are CRL extensions and not CRL entry extensions. 609The CRL extensions specified are CRL extensions and not CRL entry extensions.
549It should be noted that some software can't handle V2 CRLs. 610It should be noted that some software can't handle V2 CRLs.
611See the
612.Xr x509v3.cnf 5
613manual page for details of the extension section format.
550.It Fl crlhours Ar num 614.It Fl crlhours Ar num
551The number of hours before the next CRL is due. 615The number of hours before the next CRL is due.
552.It Fl gencrl 616.It Fl gencrl
@@ -555,16 +619,11 @@ Generate a CRL based on information in the index file.
555A 619A
556.Ar file 620.Ar file
557containing a certificate to revoke. 621containing a certificate to revoke.
558.It Fl subj Ar arg 622.It Fl status Ar serial
559Supersedes the subject name given in the request. 623Show the status of the certificate with serial number
560The 624.Ar serial .
561.Ar arg 625.It Fl updatedb
562must be formatted as 626Update the database index to purge expired certificates.
563.Ar /type0=value0/type1=value1/type2=... ;
564characters may be escaped by
565.Sq \e
566.Pq backslash ,
567no spaces are skipped.
568.El 627.El
569.Pp 628.Pp
570Many of the options can be set in the 629Many of the options can be set in the
@@ -623,7 +682,7 @@ extension with CA:TRUE and the
623value is set to 682value is set to
624.Cm copyall 683.Cm copyall
625and the user does not spot 684and the user does not spot
626this when the certificate is displayed, then this will hand the requestor 685this when the certificate is displayed, then this will hand the requester
627a valid CA certificate. 686a valid CA certificate.
628.Pp 687.Pp
629This situation can be avoided by setting 688This situation can be avoided by setting