提交 2f0ea936 编写于 作者: R Richard Levitte

Command docs: replacables are in italics, options always start with a dash

Quite a lot of replacables were still bold, and some options were
mentioned without a beginning dash.
Reviewed-by: NTomas Mraz <tmraz@fedoraproject.org>
(Merged from https://github.com/openssl/openssl/pull/10065)
上级 fed8bd90
...@@ -120,7 +120,7 @@ Verifies certificates against the CA certificate for "demoCA". If no ...@@ -120,7 +120,7 @@ Verifies certificates against the CA certificate for "demoCA". If no
certificates are specified on the command line it tries to verify the file certificates are specified on the command line it tries to verify the file
"newcert.pem". Invokes B<openssl verify> command. "newcert.pem". Invokes B<openssl verify> command.
=item B<-extra-req> | B<-extra-ca> | B<-extra-pkcs12> | B<-extra-x509> | B<-extra-verify> <extra-params> =item B<-extra-req> | B<-extra-ca> | B<-extra-pkcs12> | B<-extra-x509> | B<-extra-verify> I<extra-params>
The purpose of these parameters is to allow optional parameters to be supplied The purpose of these parameters is to allow optional parameters to be supplied
to B<openssl> that this command executes. The B<-extra-cmd> are specific to the to B<openssl> that this command executes. The B<-extra-cmd> are specific to the
......
...@@ -39,7 +39,7 @@ Print out a usage message. ...@@ -39,7 +39,7 @@ Print out a usage message.
=item B<-inform> B<DER>|B<PEM> =item B<-inform> B<DER>|B<PEM>
The input format. I<DER> is binary format and I<PEM> (the default) is base64 The input format. B<DER> is binary format and B<PEM> (the default) is base64
encoded. encoded.
=item B<-in> I<filename> =item B<-in> I<filename>
...@@ -88,12 +88,12 @@ option can be used multiple times to "drill down" into a nested structure. ...@@ -88,12 +88,12 @@ option can be used multiple times to "drill down" into a nested structure.
=item B<-genstr> I<string>, B<-genconf> I<file> =item B<-genstr> I<string>, B<-genconf> I<file>
Generate encoded data based on B<string>, B<file> or both using Generate encoded data based on I<string>, I<file> or both using
L<ASN1_generate_nconf(3)> format. If B<file> only is L<ASN1_generate_nconf(3)> format. If I<file> only is
present then the string is obtained from the default section using the name present then the string is obtained from the default section using the name
B<asn1>. The encoded data is passed through the ASN1 parser and printed out as B<asn1>. The encoded data is passed through the ASN1 parser and printed out as
though it came from a file, the contents can thus be examined and written to a though it came from a file, the contents can thus be examined and written to a
file using the B<out> option. file using the B<-out> option.
=item B<-strictpem> =item B<-strictpem>
...@@ -105,8 +105,8 @@ END marker in a PEM file. ...@@ -105,8 +105,8 @@ END marker in a PEM file.
=item B<-item> I<name> =item B<-item> I<name>
Attempt to decode and print the data as B<ASN1_ITEM name>. This can be used to Attempt to decode and print the data as B<ASN1_ITEM> I<name>. This can be used
print out the fields of any supported ASN.1 structure if the type is known. to print out the fields of any supported ASN.1 structure if the type is known.
=back =back
......
...@@ -251,7 +251,7 @@ used). ...@@ -251,7 +251,7 @@ used).
=item B<-engine> I<id> =item B<-engine> I<id>
Specifying an engine (by its unique B<id> string) will cause B<ca> Specifying an engine (by its unique I<id> string) will cause B<ca>
to attempt to obtain a functional reference to the specified engine, to attempt to obtain a functional reference to the specified engine,
thus initialising it if needed. The engine will then be set as the default thus initialising it if needed. The engine will then be set as the default
for all available algorithms. for all available algorithms.
...@@ -259,7 +259,7 @@ for all available algorithms. ...@@ -259,7 +259,7 @@ for all available algorithms.
=item B<-subj> I<arg> =item B<-subj> I<arg>
Supersedes subject name given in the request. Supersedes subject name given in the request.
The arg must be formatted as I</type0=value0/type1=value1/type2=...>. The arg must be formatted as C</type0=value0/type1=value1/type2=...>.
Keyword characters may be escaped by \ (backslash), and whitespace is retained. Keyword characters may be escaped by \ (backslash), and whitespace is retained.
Empty values are permitted, but the corresponding type will not be included Empty values are permitted, but the corresponding type will not be included
in the resulting certificate. in the resulting certificate.
...@@ -291,7 +291,7 @@ support for multivalued RDNs. Example: ...@@ -291,7 +291,7 @@ support for multivalued RDNs. Example:
I</DC=org/DC=OpenSSL/DC=users/UID=123456+CN=John Doe> I</DC=org/DC=OpenSSL/DC=users/UID=123456+CN=John Doe>
If -multi-rdn is not used then the UID value is I<123456+CN=John Doe>. If B<-multi-rdn> is not used then the UID value is I<123456+CN=John Doe>.
=item B<-rand> I<files> =item B<-rand> I<files>
...@@ -353,9 +353,9 @@ Updates the database index to purge expired certificates. ...@@ -353,9 +353,9 @@ Updates the database index to purge expired certificates.
=item B<-crl_reason> I<reason> =item B<-crl_reason> I<reason>
Revocation reason, where B<reason> is one of: B<unspecified>, B<keyCompromise>, Revocation reason, where I<reason> is one of: B<unspecified>, B<keyCompromise>,
B<CACompromise>, B<affiliationChanged>, B<superseded>, B<cessationOfOperation>, B<CACompromise>, B<affiliationChanged>, B<superseded>, B<cessationOfOperation>,
B<certificateHold> or B<removeFromCRL>. The matching of B<reason> is case B<certificateHold> or B<removeFromCRL>. The matching of I<reason> is case
insensitive. Setting any revocation reason will make the CRL v2. insensitive. Setting any revocation reason will make the CRL v2.
In practice B<removeFromCRL> is not particularly useful because it is only used In practice B<removeFromCRL> is not particularly useful because it is only used
...@@ -364,14 +364,14 @@ in delta CRLs which are not currently implemented. ...@@ -364,14 +364,14 @@ in delta CRLs which are not currently implemented.
=item B<-crl_hold> I<instruction> =item B<-crl_hold> I<instruction>
This sets the CRL revocation reason code to B<certificateHold> and the hold This sets the CRL revocation reason code to B<certificateHold> and the hold
instruction to B<instruction> which must be an OID. Although any OID can be instruction to I<instruction> which must be an OID. Although any OID can be
used only B<holdInstructionNone> (the use of which is discouraged by RFC2459) used only B<holdInstructionNone> (the use of which is discouraged by RFC2459)
B<holdInstructionCallIssuer> or B<holdInstructionReject> will normally be used. B<holdInstructionCallIssuer> or B<holdInstructionReject> will normally be used.
=item B<-crl_compromise> I<time> =item B<-crl_compromise> I<time>
This sets the revocation reason to B<keyCompromise> and the compromise time to This sets the revocation reason to B<keyCompromise> and the compromise time to
B<time>. B<time> should be in GeneralizedTime format that is B<YYYYMMDDHHMMSSZ>. I<time>. I<time> should be in GeneralizedTime format that is I<YYYYMMDDHHMMSSZ>.
=item B<-crl_CA_compromise> I<time> =item B<-crl_CA_compromise> I<time>
......
...@@ -22,7 +22,7 @@ B<openssl> B<ciphers> ...@@ -22,7 +22,7 @@ B<openssl> B<ciphers>
[B<-stdname>] [B<-stdname>]
[B<-convert> I<name>] [B<-convert> I<name>]
[B<-ciphersuites> I<val>] [B<-ciphersuites> I<val>]
[B<cipherlist>] [I<cipherlist>]
=for comment ifdef ssl3 tls1 tls1_1 tls1_2 tls1_3 psk srp =for comment ifdef ssl3 tls1 tls1_1 tls1_2 tls1_3 psk srp
...@@ -87,7 +87,7 @@ Precede each cipher suite by its standard name. ...@@ -87,7 +87,7 @@ Precede each cipher suite by its standard name.
=item B<-convert> I<name> =item B<-convert> I<name>
Convert a standard cipher B<name> to its OpenSSL name. Convert a standard cipher I<name> to its OpenSSL name.
=item B<-ciphersuites> I<val> =item B<-ciphersuites> I<val>
...@@ -147,8 +147,8 @@ will not moved to the end of the list. ...@@ -147,8 +147,8 @@ will not moved to the end of the list.
The cipher string B<@STRENGTH> can be used at any point to sort the current The cipher string B<@STRENGTH> can be used at any point to sort the current
cipher list in order of encryption algorithm key length. cipher list in order of encryption algorithm key length.
The cipher string B<@SECLEVEL=n> can be used at any point to set the security The cipher string B<@SECLEVEL>=I<n> can be used at any point to set the security
level to B<n>, which should be a number between zero and five, inclusive. level to I<n>, which should be a number between zero and five, inclusive.
See L<SSL_CTX_set_security_level> for a description of what each level means. See L<SSL_CTX_set_security_level> for a description of what each level means.
The cipher list can be prefixed with the B<DEFAULT> keyword, which enables The cipher list can be prefixed with the B<DEFAULT> keyword, which enables
......
...@@ -57,13 +57,13 @@ x509 ...@@ -57,13 +57,13 @@ x509
=for comment generic =for comment generic
B<openssl> B<cmd> [B<-help>] [B<...>] B<openssl> I<cmd> B<-help> | [I<-option> | I<-option> I<arg>] ... [I<arg>] ...
=head1 DESCRIPTION =head1 DESCRIPTION
Every B<cmd> listed above is a (sub-)command of the L<openssl(1)> application. Every I<cmd> listed above is a (sub-)command of the L<openssl(1)> application.
It has its own detailed manual page at B<openssl-cmd(1)>. For example, to view It has its own detailed manual page at B<openssl-I<cmd>>(1). For example, to
the manual page for the B<openssl dgst> command, type B<man openssl-dgst>. view the manual page for the B<openssl dgst> command, type C<man openssl-dgst>.
=head1 OPTIONS =head1 OPTIONS
...@@ -132,8 +132,8 @@ L<openssl-x509(1)>, ...@@ -132,8 +132,8 @@ L<openssl-x509(1)>,
=head1 HISTORY =head1 HISTORY
Initially, the manual page entry for the B<openssl cmd> command used Initially, the manual page entry for the C<openssl I<cmd>> command used
to be available at B<cmd(1)>. Later, the alias B<openssl-cmd(1)> was to be available at I<cmd>(1). Later, the alias B<openssl-I<cmd>>(1) was
introduced, which made it easier to group the openssl commands using introduced, which made it easier to group the openssl commands using
the L<apropos(1)> command or the shell's tab completion. the L<apropos(1)> command or the shell's tab completion.
......
...@@ -385,7 +385,7 @@ the signers certificates. The certificates should be in PEM format. ...@@ -385,7 +385,7 @@ the signers certificates. The certificates should be in PEM format.
=item B<-certsout> I<file> =item B<-certsout> I<file>
Any certificates contained in the message are written to B<file>. Any certificates contained in the message are written to I<file>.
=item B<-signer> I<file> =item B<-signer> I<file>
...@@ -446,14 +446,14 @@ content encryption key using an AES key in the B<KEKRecipientInfo> type. ...@@ -446,14 +446,14 @@ content encryption key using an AES key in the B<KEKRecipientInfo> type.
The key identifier for the supplied symmetric key for B<KEKRecipientInfo> type. The key identifier for the supplied symmetric key for B<KEKRecipientInfo> type.
This option B<must> be present if the B<-secretkey> option is used with This option B<must> be present if the B<-secretkey> option is used with
B<-encrypt>. With B<-decrypt> operations the B<id> is used to locate the B<-encrypt>. With B<-decrypt> operations the I<id> is used to locate the
relevant key if it is not supplied then an attempt is used to decrypt any relevant key if it is not supplied then an attempt is used to decrypt any
B<KEKRecipientInfo> structures. B<KEKRecipientInfo> structures.
=item B<-econtent_type> I<type> =item B<-econtent_type> I<type>
Set the encapsulated content type to B<type> if not supplied the B<Data> type Set the encapsulated content type to I<type> if not supplied the B<Data> type
is used. The B<type> argument can be any valid OID name in either text or is used. The I<type> argument can be any valid OID name in either text or
numerical format. numerical format.
=item B<-inkey> I<file> =item B<-inkey> I<file>
...@@ -766,7 +766,7 @@ No revocation checking is done on the signer's certificate. ...@@ -766,7 +766,7 @@ No revocation checking is done on the signer's certificate.
The use of multiple B<-signer> options and the B<-resign> command were first The use of multiple B<-signer> options and the B<-resign> command were first
added in OpenSSL 1.0.0. added in OpenSSL 1.0.0.
The B<keyopt> option was added in OpenSSL 1.0.2. The B<-keyopt> option was added in OpenSSL 1.0.2.
Support for RSA-OAEP and RSA-PSS was added in OpenSSL 1.0.2. Support for RSA-OAEP and RSA-PSS was added in OpenSSL 1.0.2.
......
...@@ -95,12 +95,12 @@ Output the nextUpdate field. ...@@ -95,12 +95,12 @@ Output the nextUpdate field.
=item B<-CAfile> I<file> =item B<-CAfile> I<file>
Verify the signature on a CRL by looking up the issuing certificate in Verify the signature on a CRL by looking up the issuing certificate in
B<file>. I<file>.
=item B<-CApath> I<dir> =item B<-CApath> I<dir>
Verify the signature on a CRL by looking up the issuing certificate in Verify the signature on a CRL by looking up the issuing certificate in
B<dir>. This directory must be a standard certificate directory: that I<dir>. This directory must be a standard certificate directory: that
is a hash of each subject name (using B<x509 -hash>) should be linked is a hash of each subject name (using B<x509 -hash>) should be linked
to each certificate. to each certificate.
......
...@@ -39,7 +39,7 @@ signatures using message digests. ...@@ -39,7 +39,7 @@ signatures using message digests.
The generic name, B<dgst>, may be used with an option specifying the The generic name, B<dgst>, may be used with an option specifying the
algorithm to be used. algorithm to be used.
The default digest is I<sha256>. The default digest is B<sha256>.
A supported I<digest> name may also be used as the command name. A supported I<digest> name may also be used as the command name.
To see the list of supported algorithms, use the I<list --digest-commands> To see the list of supported algorithms, use the I<list --digest-commands>
command. command.
...@@ -60,7 +60,7 @@ supported digests, use the command C<list --digest-commands>. ...@@ -60,7 +60,7 @@ supported digests, use the command C<list --digest-commands>.
=item B<-c> =item B<-c>
Print out the digest in two digit groups separated by colons, only relevant if Print out the digest in two digit groups separated by colons, only relevant if
B<hex> format output is used. the B<-hex> option is given as well.
=item B<-d> =item B<-d>
...@@ -103,7 +103,7 @@ Names and values of these options are algorithm-specific. ...@@ -103,7 +103,7 @@ Names and values of these options are algorithm-specific.
=item B<-passin> I<arg> =item B<-passin> I<arg>
The private key password source. For more information about the format of B<arg> The private key password source. For more information about the format of I<arg>
see L<openssl(1)/Pass phrase options>. see L<openssl(1)/Pass phrase options>.
=item B<-verify> I<filename> =item B<-verify> I<filename>
...@@ -144,13 +144,13 @@ Following options are supported by both by B<HMAC> and B<gost-mac>: ...@@ -144,13 +144,13 @@ Following options are supported by both by B<HMAC> and B<gost-mac>:
=over 4 =over 4
=item B<key:string> =item B<key>:I<string>
Specifies MAC key as alphanumeric string (use if key contain printable Specifies MAC key as alphanumeric string (use if key contain printable
characters only). String length must conform to any restrictions of characters only). String length must conform to any restrictions of
the MAC algorithm for example exactly 32 chars for gost-mac. the MAC algorithm for example exactly 32 chars for gost-mac.
=item B<hexkey:string> =item B<hexkey>:I<string>
Specifies MAC key in hexadecimal form (two hex digits per byte). Specifies MAC key in hexadecimal form (two hex digits per byte).
Key length must conform to any restrictions of the MAC algorithm Key length must conform to any restrictions of the MAC algorithm
...@@ -179,7 +179,7 @@ Compute HMAC using a specific key for certain OpenSSL-FIPS operations. ...@@ -179,7 +179,7 @@ Compute HMAC using a specific key for certain OpenSSL-FIPS operations.
=item B<-engine> I<id> =item B<-engine> I<id>
Use engine B<id> for operations (including private key storage). Use engine I<id> for operations (including private key storage).
This engine is not used as source for digest algorithms, unless it is This engine is not used as source for digest algorithms, unless it is
also specified in the configuration file or B<-engine_impl> is also also specified in the configuration file or B<-engine_impl> is also
specified. specified.
...@@ -187,7 +187,7 @@ specified. ...@@ -187,7 +187,7 @@ specified.
=item B<-engine_impl> =item B<-engine_impl>
When used with the B<-engine> option, it specifies to also use When used with the B<-engine> option, it specifies to also use
engine B<id> for digest operations. engine I<id> for digest operations.
=item I<file> ... =item I<file> ...
......
...@@ -83,7 +83,7 @@ displays a warning if not. ...@@ -83,7 +83,7 @@ displays a warning if not.
The generator to use, either 2, 3 or 5. If present then the The generator to use, either 2, 3 or 5. If present then the
input file is ignored and parameters are generated instead. If not input file is ignored and parameters are generated instead. If not
present but B<numbits> is present, parameters are generated with the present but I<numbits> is present, parameters are generated with the
default generator 2. default generator 2.
=item B<-rand> I<files> =item B<-rand> I<files>
...@@ -122,7 +122,7 @@ be loaded by calling the get_dhNNNN() function. ...@@ -122,7 +122,7 @@ be loaded by calling the get_dhNNNN() function.
=item B<-engine> I<id> =item B<-engine> I<id>
Specifying an engine (by its unique B<id> string) will cause B<dhparam> Specifying an engine (by its unique I<id> string) will cause B<dhparam>
to attempt to obtain a functional reference to the specified engine, to attempt to obtain a functional reference to the specified engine,
thus initialising it if needed. The engine will then be set as the default thus initialising it if needed. The engine will then be set as the default
for all available algorithms. for all available algorithms.
......
...@@ -75,7 +75,7 @@ prompted for. ...@@ -75,7 +75,7 @@ prompted for.
=item B<-passin> I<arg> =item B<-passin> I<arg>
The input file password source. For more information about the format of B<arg> The input file password source. For more information about the format of I<arg>
see L<openssl(1)/Pass phrase options>. see L<openssl(1)/Pass phrase options>.
=item B<-out> I<filename> =item B<-out> I<filename>
...@@ -87,7 +87,7 @@ filename. ...@@ -87,7 +87,7 @@ filename.
=item B<-passout> I<arg> =item B<-passout> I<arg>
The output file password source. For more information about the format of B<arg> The output file password source. For more information about the format of I<arg>
see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)>. see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)>.
=item B<-aes128>, B<-aes192>, B<-aes256>, B<-aria128>, B<-aria192>, B<-aria256>, B<-camellia128>, B<-camellia192>, B<-camellia256>, B<-des>, B<-des3>, B<-idea> =item B<-aes128>, B<-aes192>, B<-aes256>, B<-aria128>, B<-aria192>, B<-aria256>, B<-camellia128>, B<-camellia192>, B<-camellia256>, B<-des>, B<-des3>, B<-idea>
...@@ -125,7 +125,7 @@ a public key. ...@@ -125,7 +125,7 @@ a public key.
=item B<-engine> I<id> =item B<-engine> I<id>
Specifying an engine (by its unique B<id> string) will cause B<dsa> Specifying an engine (by its unique I<id> string) will cause B<dsa>
to attempt to obtain a functional reference to the specified engine, to attempt to obtain a functional reference to the specified engine,
thus initialising it if needed. The engine will then be set as the default thus initialising it if needed. The engine will then be set as the default
for all available algorithms. for all available algorithms.
......
...@@ -49,7 +49,7 @@ as the B<-inform> option. ...@@ -49,7 +49,7 @@ as the B<-inform> option.
=item B<-in> I<filename> =item B<-in> I<filename>
This specifies the input filename to read parameters from or standard input if This specifies the input filename to read parameters from or standard input if
this option is not specified. If the B<numbits> parameter is included then this option is not specified. If the I<numbits> parameter is included then
this option will be ignored. this option will be ignored.
=item B<-out> I<filename> =item B<-out> I<filename>
...@@ -90,7 +90,7 @@ This can be used with a subsequent B<-rand> flag. ...@@ -90,7 +90,7 @@ This can be used with a subsequent B<-rand> flag.
=item B<-engine> I<id> =item B<-engine> I<id>
Specifying an engine (by its unique B<id> string) will cause B<dsaparam> Specifying an engine (by its unique I<id> string) will cause B<dsaparam>
to attempt to obtain a functional reference to the specified engine, to attempt to obtain a functional reference to the specified engine,
thus initialising it if needed. The engine will then be set as the default thus initialising it if needed. The engine will then be set as the default
for all available algorithms. for all available algorithms.
...@@ -99,10 +99,10 @@ for all available algorithms. ...@@ -99,10 +99,10 @@ for all available algorithms.
Print extra details about the operations being performed. Print extra details about the operations being performed.
=item B<numbits> =item I<numbits>
This option specifies that a parameter set should be generated of size This option specifies that a parameter set should be generated of size
B<numbits>. It must be the last option. If this option is included then I<numbits>. It must be the last option. If this option is included then
the input file (if any) is ignored. the input file (if any) is ignored.
=back =back
......
...@@ -68,7 +68,7 @@ prompted for. ...@@ -68,7 +68,7 @@ prompted for.
=item B<-passin> I<arg> =item B<-passin> I<arg>
The input file password source. For more information about the format of B<arg> The input file password source. For more information about the format of I<arg>
see L<openssl(1)/Pass phrase options>. see L<openssl(1)/Pass phrase options>.
=item B<-out> I<filename> =item B<-out> I<filename>
...@@ -80,7 +80,7 @@ filename. ...@@ -80,7 +80,7 @@ filename.
=item B<-passout> I<arg> =item B<-passout> I<arg>
The output file password source. For more information about the format of B<arg> The output file password source. For more information about the format of I<arg>
see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)>. see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)>.
=item B<-des>|B<-des3>|B<-idea> =item B<-des>|B<-des3>|B<-idea>
...@@ -113,7 +113,7 @@ By default a private key is output. With this option a public ...@@ -113,7 +113,7 @@ By default a private key is output. With this option a public
key will be output instead. This option is automatically set if the input is key will be output instead. This option is automatically set if the input is
a public key. a public key.
=item B<-conv_form> =item B<-conv_form> I<arg>
This specifies how the points on the elliptic curve are converted This specifies how the points on the elliptic curve are converted
into octet strings. Possible values are: B<compressed> (the default into octet strings. Possible values are: B<compressed> (the default
...@@ -143,7 +143,7 @@ This option checks the consistency of an EC private or public key. ...@@ -143,7 +143,7 @@ This option checks the consistency of an EC private or public key.
=item B<-engine> I<id> =item B<-engine> I<id>
Specifying an engine (by its unique B<id> string) will cause B<ec> Specifying an engine (by its unique I<id> string) will cause B<ec>
to attempt to obtain a functional reference to the specified engine, to attempt to obtain a functional reference to the specified engine,
thus initialising it if needed. The engine will then be set as the default thus initialising it if needed. The engine will then be set as the default
for all available algorithms. for all available algorithms.
......
...@@ -96,7 +96,7 @@ to get a list of all currently implemented EC parameters. ...@@ -96,7 +96,7 @@ to get a list of all currently implemented EC parameters.
If this options is specified B<ecparam> will print out a list of all If this options is specified B<ecparam> will print out a list of all
currently implemented EC parameters names and exit. currently implemented EC parameters names and exit.
=item B<-conv_form> =item B<-conv_form> I<arg>
This specifies how the points on the elliptic curve are converted This specifies how the points on the elliptic curve are converted
into octet strings. Possible values are: B<compressed>, B<uncompressed> (the into octet strings. Possible values are: B<compressed>, B<uncompressed> (the
...@@ -139,7 +139,7 @@ This can be used with a subsequent B<-rand> flag. ...@@ -139,7 +139,7 @@ This can be used with a subsequent B<-rand> flag.
=item B<-engine> I<id> =item B<-engine> I<id>
Specifying an engine (by its unique B<id> string) will cause B<ecparam> Specifying an engine (by its unique I<id> string) will cause B<ecparam>
to attempt to obtain a functional reference to the specified engine, to attempt to obtain a functional reference to the specified engine,
thus initialising it if needed. The engine will then be set as the default thus initialising it if needed. The engine will then be set as the default
for all available algorithms. for all available algorithms.
......
...@@ -72,7 +72,7 @@ The output filename, standard output by default. ...@@ -72,7 +72,7 @@ The output filename, standard output by default.
=item B<-pass> I<arg> =item B<-pass> I<arg>
The password source. For more information about the format of B<arg> The password source. For more information about the format of I<arg>
see L<openssl(1)/Pass phrase options>. see L<openssl(1)/Pass phrase options>.
=item B<-e> =item B<-e>
...@@ -104,7 +104,7 @@ versions of OpenSSL. Superseded by the B<-pass> argument. ...@@ -104,7 +104,7 @@ versions of OpenSSL. Superseded by the B<-pass> argument.
=item B<-kfile> I<filename> =item B<-kfile> I<filename>
Read the password to derive the key from the first line of B<filename>. Read the password to derive the key from the first line of I<filename>.
This is for compatibility with previous versions of OpenSSL. Superseded by This is for compatibility with previous versions of OpenSSL. Superseded by
the B<-pass> argument. the B<-pass> argument.
...@@ -202,7 +202,7 @@ This can be used with a subsequent B<-rand> flag. ...@@ -202,7 +202,7 @@ This can be used with a subsequent B<-rand> flag.
=head1 NOTES =head1 NOTES
The program can be called either as B<openssl cipher> or The program can be called either as B<openssl cipher> or
B<openssl enc -cipher>. The first form doesn't work with B<openssl enc -I<cipher>>. The first form doesn't work with
engine-provided ciphers, because this form is processed before the engine-provided ciphers, because this form is processed before the
configuration file is read and any ENGINEs loaded. configuration file is read and any ENGINEs loaded.
Use the B<list> command to get a list of supported ciphers. Use the B<list> command to get a list of supported ciphers.
...@@ -251,7 +251,7 @@ Blowfish and RC5 algorithms use a 128 bit key. ...@@ -251,7 +251,7 @@ Blowfish and RC5 algorithms use a 128 bit key.
Note that some of these ciphers can be disabled at compile time Note that some of these ciphers can be disabled at compile time
and some are available only if an appropriate engine is configured and some are available only if an appropriate engine is configured
in the configuration file. The output of the B<enc> command run with in the configuration file. The output of the B<enc> command run with
the B<-ciphers> option (that is B<openssl enc -ciphers>) produces a the B<-I<ciphers>> option (that is B<openssl enc -I<ciphers>>) produces a
list of ciphers, supported by your version of OpenSSL, including list of ciphers, supported by your version of OpenSSL, including
ones provided by configured engines. ones provided by configured engines.
......
...@@ -15,14 +15,14 @@ B<openssl engine> ...@@ -15,14 +15,14 @@ B<openssl engine>
[B<-c>] [B<-c>]
[B<-t>] [B<-t>]
[B<-tt>] [B<-tt>]
[B<-pre> I<command>] [B<-pre> I<command>] ...
[B<-post> I<command>] [B<-post> I<command>] ...
[I<engine> ...] [I<engine> ...]
=head1 DESCRIPTION =head1 DESCRIPTION
The B<engine> command is used to query the status and capabilities The B<engine> command is used to query the status and capabilities
of the specified B<engine>'s. of the specified I<engine>'s.
Engines may be specified before and after all other command-line flags. Engines may be specified before and after all other command-line flags.
Only those specified are queried. Only those specified are queried.
...@@ -56,10 +56,13 @@ Displays an error trace for any unavailable engine. ...@@ -56,10 +56,13 @@ Displays an error trace for any unavailable engine.
Command-line configuration of engines. Command-line configuration of engines.
The B<-pre> command is given to the engine before it is loaded and The B<-pre> command is given to the engine before it is loaded and
the B<-post> command is given after the engine is loaded. the B<-post> command is given after the engine is loaded.
The I<command> is of the form I<cmd:val> where I<cmd> is the command, The I<command> is of the form I<cmd>:I<val> where I<cmd> is the command,
and I<val> is the value for the command. and I<val> is the value for the command.
See the example below. See the example below.
These two options are cumulative, so they may be given more than once in the
same command.
=back =back
=head1 EXAMPLES =head1 EXAMPLES
......
...@@ -6,7 +6,7 @@ openssl-errstr - lookup error codes ...@@ -6,7 +6,7 @@ openssl-errstr - lookup error codes
=head1 SYNOPSIS =head1 SYNOPSIS
B<openssl errstr error_code> B<openssl errstr> I<error_code>
=head1 DESCRIPTION =head1 DESCRIPTION
......
...@@ -83,20 +83,20 @@ Common control strings used for fipsinstall are: ...@@ -83,20 +83,20 @@ Common control strings used for fipsinstall are:
=over 4 =over 4
=item B<key:string> =item B<key>:I<string>
Specifies the MAC key as an alphanumeric string (use if the key contains Specifies the MAC key as an alphanumeric string (use if the key contains
printable characters only). printable characters only).
The string length must conform to any restrictions of the MAC algorithm. The string length must conform to any restrictions of the MAC algorithm.
A key must be specified for every MAC algorithm. A key must be specified for every MAC algorithm.
=item B<hexkey:string> =item B<hexkey>:I<string>
Specifies the MAC key in hexadecimal form (two hex digits per byte). Specifies the MAC key in hexadecimal form (two hex digits per byte).
The key length must conform to any restrictions of the MAC algorithm. The key length must conform to any restrictions of the MAC algorithm.
A key must be specified for every MAC algorithm. A key must be specified for every MAC algorithm.
=item B<digest:string> =item B<digest>:I<string>
Used by HMAC as an alphanumeric string (use if the key contains printable Used by HMAC as an alphanumeric string (use if the key contains printable
characters only). characters only).
......
...@@ -25,7 +25,7 @@ B<openssl> B<gendsa> ...@@ -25,7 +25,7 @@ B<openssl> B<gendsa>
[B<-writerand> I<file>] [B<-writerand> I<file>]
[B<-engine> I<id>] [B<-engine> I<id>]
[B<-verbose>] [B<-verbose>]
[B<paramfile>] [I<paramfile>]
=for comment ifdef engine =for comment ifdef engine
...@@ -67,7 +67,7 @@ This can be used with a subsequent B<-rand> flag. ...@@ -67,7 +67,7 @@ This can be used with a subsequent B<-rand> flag.
=item B<-engine> I<id> =item B<-engine> I<id>
Specifying an engine (by its unique B<id> string) will cause B<gendsa> Specifying an engine (by its unique I<id> string) will cause B<gendsa>
to attempt to obtain a functional reference to the specified engine, to attempt to obtain a functional reference to the specified engine,
thus initialising it if needed. The engine will then be set as the default thus initialising it if needed. The engine will then be set as the default
for all available algorithms. for all available algorithms.
...@@ -76,11 +76,11 @@ for all available algorithms. ...@@ -76,11 +76,11 @@ for all available algorithms.
Print extra details about the operations being performed. Print extra details about the operations being performed.
=item B<paramfile> =item I<paramfile>
This option specifies the DSA parameter file to use. The parameters in this The DSA parameter file to use. The parameters in this file determine
file determine the size of the private key. DSA parameters can be generated the size of the private key. DSA parameters can be generated and
and examined using the B<openssl dsaparam> command. examined using the B<openssl dsaparam> command.
=back =back
......
...@@ -15,7 +15,7 @@ B<openssl> B<genpkey> ...@@ -15,7 +15,7 @@ B<openssl> B<genpkey>
[B<-engine> I<id>] [B<-engine> I<id>]
[B<-paramfile> I<file>] [B<-paramfile> I<file>]
[B<-algorithm> I<alg>] [B<-algorithm> I<alg>]
[B<-pkeyopt> I<opt:value>] [B<-pkeyopt> I<opt>:I<value>]
[B<-genparam>] [B<-genparam>]
[B<-text>] [B<-text>]
...@@ -44,7 +44,7 @@ This specifies the output format DER or PEM. The default format is PEM. ...@@ -44,7 +44,7 @@ This specifies the output format DER or PEM. The default format is PEM.
=item B<-pass> I<arg> =item B<-pass> I<arg>
The output file password source. For more information about the format of B<arg> The output file password source. For more information about the format of I<arg>
see L<openssl(1)/Pass phrase options>. see L<openssl(1)/Pass phrase options>.
=item B<-I<cipher>> =item B<-I<cipher>>
...@@ -54,7 +54,7 @@ name accepted by EVP_get_cipherbyname() is acceptable such as B<des3>. ...@@ -54,7 +54,7 @@ name accepted by EVP_get_cipherbyname() is acceptable such as B<des3>.
=item B<-engine> I<id> =item B<-engine> I<id>
Specifying an engine (by its unique B<id> string) will cause B<genpkey> Specifying an engine (by its unique I<id> string) will cause B<genpkey>
to attempt to obtain a functional reference to the specified engine, to attempt to obtain a functional reference to the specified engine,
thus initialising it if needed. The engine will then be set as the default thus initialising it if needed. The engine will then be set as the default
for all available algorithms. If used this option should precede all other for all available algorithms. If used this option should precede all other
...@@ -79,9 +79,9 @@ will be generated. Use the B<dh_paramgen_type> option to indicate whether PKCS#3 ...@@ -79,9 +79,9 @@ will be generated. Use the B<dh_paramgen_type> option to indicate whether PKCS#3
or X9.42 DH parameters are required. See L<DH Parameter Generation Options> or X9.42 DH parameters are required. See L<DH Parameter Generation Options>
below for more details. below for more details.
=item B<-pkeyopt> I<opt:value> =item B<-pkeyopt> I<opt>:I<value>
Set the public key algorithm option B<opt> to B<value>. The precise set of Set the public key algorithm option I<opt> to I<value>. The precise set of
options supported depends on the public key algorithm used and its options supported depends on the public key algorithm used and its
implementation. See L<KEY GENERATION OPTIONS> and implementation. See L<KEY GENERATION OPTIONS> and
L<PARAMETER GENERATION OPTIONS> below for more details. L<PARAMETER GENERATION OPTIONS> below for more details.
...@@ -138,22 +138,23 @@ Note: by default an B<RSA-PSS> key has no parameter restrictions. ...@@ -138,22 +138,23 @@ Note: by default an B<RSA-PSS> key has no parameter restrictions.
=over 4 =over 4
=item B<rsa_keygen_bits:numbits>, B<rsa_keygen_primes:numprimes>, B<rsa_keygen_pubexp:value> =item B<rsa_keygen_bits>:I<numbits>, B<rsa_keygen_primes>:I<numprimes>,
B<rsa_keygen_pubexp>:I<value>
These options have the same meaning as the B<RSA> algorithm. These options have the same meaning as the B<RSA> algorithm.
=item B<rsa_pss_keygen_md:digest> =item B<rsa_pss_keygen_md>:I<digest>
If set the key is restricted and can only use B<digest> for signing. If set the key is restricted and can only use I<digest> for signing.
=item B<rsa_pss_keygen_mgf1_md:digest> =item B<rsa_pss_keygen_mgf1_md>:I<digest>
If set the key is restricted and can only use B<digest> as it's MGF1 If set the key is restricted and can only use I<digest> as it's MGF1
parameter. parameter.
=item B<rsa_pss_keygen_saltlen:len> =item B<rsa_pss_keygen_saltlen>:I<len>
If set the key is restricted and B<len> specifies the minimum salt length. If set the key is restricted and I<len> specifies the minimum salt length.
=back =back
...@@ -163,14 +164,14 @@ The EC key generation options can also be used for parameter generation. ...@@ -163,14 +164,14 @@ The EC key generation options can also be used for parameter generation.
=over 4 =over 4
=item B<ec_paramgen_curve:curve> =item B<ec_paramgen_curve>:I<curve>
The EC curve to use. OpenSSL supports NIST curve names such as "P-256". The EC curve to use. OpenSSL supports NIST curve names such as "P-256".
=item B<ec_param_enc:encoding> =item B<ec_param_enc>:I<encoding>
The encoding to use for parameters. The "encoding" parameter must be either The encoding to use for parameters. The I<encoding> parameter must be either
"named_curve" or "explicit". The default value is "named_curve". B<named_curve> or B<explicit>. The default value is B<named_curve>.
=back =back
...@@ -184,16 +185,16 @@ below. ...@@ -184,16 +185,16 @@ below.
=over 4 =over 4
=item B<dsa_paramgen_bits:numbits> =item B<dsa_paramgen_bits>:I<numbits>
The number of bits in the generated prime. If not specified 2048 is used. The number of bits in the generated prime. If not specified 2048 is used.
=item B<dsa_paramgen_q_bits:numbits> =item B<dsa_paramgen_q_bits>:I<numbits>
The number of bits in the q parameter. Must be one of 160, 224 or 256. If not The number of bits in the q parameter. Must be one of 160, 224 or 256. If not
specified 224 is used. specified 224 is used.
=item B<dsa_paramgen_md:digest> =item B<dsa_paramgen_md>:I<digest>
The digest to use during parameter generation. Must be one of B<sha1>, B<sha224> The digest to use during parameter generation. Must be one of B<sha1>, B<sha224>
or B<sha256>. If set, then the number of bits in B<q> will match the output size or B<sha256>. If set, then the number of bits in B<q> will match the output size
...@@ -208,30 +209,30 @@ or B<sha256> if it is 256. ...@@ -208,30 +209,30 @@ or B<sha256> if it is 256.
=over 4 =over 4
=item B<dh_paramgen_prime_len:numbits> =item B<dh_paramgen_prime_len>:I<numbits>
The number of bits in the prime parameter B<p>. The default is 2048. The number of bits in the prime parameter I<p>. The default is 2048.
=item B<dh_paramgen_subprime_len:numbits> =item B<dh_paramgen_subprime_len>:I<numbits>
The number of bits in the sub prime parameter B<q>. The default is 256 if the The number of bits in the sub prime parameter I<q>. The default is 256 if the
prime is at least 2048 bits long or 160 otherwise. Only relevant if used in prime is at least 2048 bits long or 160 otherwise. Only relevant if used in
conjunction with the B<dh_paramgen_type> option to generate X9.42 DH parameters. conjunction with the B<dh_paramgen_type> option to generate X9.42 DH parameters.
=item B<dh_paramgen_generator:value> =item B<dh_paramgen_generator>:I<value>
The value to use for the generator B<g>. The default is 2. The value to use for the generator I<g>. The default is 2.
=item B<dh_paramgen_type:value> =item B<dh_paramgen_type>:I<value>
The type of DH parameters to generate. Use 0 for PKCS#3 DH and 1 for X9.42 DH. The type of DH parameters to generate. Use 0 for PKCS#3 DH and 1 for X9.42 DH.
The default is 0. The default is 0.
=item B<dh_rfc5114:num> =item B<dh_rfc5114>:I<num>
If this option is set, then the appropriate RFC5114 parameters are used If this option is set, then the appropriate RFC5114 parameters are used
instead of generating new parameters. The value B<num> can take the instead of generating new parameters. The value I<num> can be one of
values 1, 2 or 3 corresponding to RFC5114 DH parameters consisting of 1, 2 or 3 corresponding to RFC5114 DH parameters consisting of
1024 bit group with 160 bit subgroup, 2048 bit group with 224 bit subgroup 1024 bit group with 160 bit subgroup, 2048 bit group with 224 bit subgroup
and 2048 bit group with 256 bit subgroup as mentioned in RFC5114 sections and 2048 bit group with 256 bit subgroup as mentioned in RFC5114 sections
2.1, 2.2 and 2.3 respectively. If present this overrides all other DH parameter 2.1, 2.2 and 2.3 respectively. If present this overrides all other DH parameter
......
...@@ -22,8 +22,7 @@ B<openssl> B<genrsa> ...@@ -22,8 +22,7 @@ B<openssl> B<genrsa>
[B<-des>] [B<-des>]
[B<-des3>] [B<-des3>]
[B<-idea>] [B<-idea>]
[B<-f4>] [B<-f4>|B<-3>]
[B<-3>]
[B<-rand> I<files>] [B<-rand> I<files>]
[B<-writerand> I<file>] [B<-writerand> I<file>]
[B<-engine> I<id>] [B<-engine> I<id>]
...@@ -80,16 +79,16 @@ This can be used with a subsequent B<-rand> flag. ...@@ -80,16 +79,16 @@ This can be used with a subsequent B<-rand> flag.
=item B<-engine> I<id> =item B<-engine> I<id>
Specifying an engine (by its unique B<id> string) will cause B<genrsa> Specifying an engine (by its unique I<id> string) will cause B<genrsa>
to attempt to obtain a functional reference to the specified engine, to attempt to obtain a functional reference to the specified engine,
thus initialising it if needed. The engine will then be set as the default thus initialising it if needed. The engine will then be set as the default
for all available algorithms. for all available algorithms.
=item B<-primes> I<num> =item B<-primes> I<num>
Specify the number of primes to use while generating the RSA key. The B<num> Specify the number of primes to use while generating the RSA key. The I<num>
parameter must be a positive integer that is greater than 1 and less than 16. parameter must be a positive integer that is greater than 1 and less than 16.
If B<num> is greater than 2, then the generated key is called a 'multi-prime' If I<num> is greater than 2, then the generated key is called a 'multi-prime'
RSA key, which is defined in RFC 8017. RSA key, which is defined in RFC 8017.
=item B<-verbose> =item B<-verbose>
......
...@@ -12,7 +12,7 @@ B<openssl mac> ...@@ -12,7 +12,7 @@ B<openssl mac>
[B<-in> I<filename>] [B<-in> I<filename>]
[B<-out> I<filename>] [B<-out> I<filename>]
[B<-binary>] [B<-binary>]
B<mac_name> I<mac_name>
=head1 DESCRIPTION =head1 DESCRIPTION
...@@ -51,55 +51,55 @@ Common parameter names used by EVP_MAC_CTX_get_params() are: ...@@ -51,55 +51,55 @@ Common parameter names used by EVP_MAC_CTX_get_params() are:
=over 4 =over 4
=item B<key:string> =item B<key:>I<string>
Specifies the MAC key as an alphanumeric string (use if the key contains Specifies the MAC key as an alphanumeric string (use if the key contains
printable characters only). printable characters only).
The string length must conform to any restrictions of the MAC algorithm. The string length must conform to any restrictions of the MAC algorithm.
A key must be specified for every MAC algorithm. A key must be specified for every MAC algorithm.
=item B<hexkey:string> =item B<hexkey:>I<string>
Specifies the MAC key in hexadecimal form (two hex digits per byte). Specifies the MAC key in hexadecimal form (two hex digits per byte).
The key length must conform to any restrictions of the MAC algorithm. The key length must conform to any restrictions of the MAC algorithm.
A key must be specified for every MAC algorithm. A key must be specified for every MAC algorithm.
=item B<digest:string> =item B<digest:>I<string>
Used by HMAC as an alphanumeric string (use if the key contains printable Used by HMAC as an alphanumeric string (use if the key contains printable
characters only). characters only).
The string length must conform to any restrictions of the MAC algorithm. The string length must conform to any restrictions of the MAC algorithm.
To see the list of supported digests, use the command I<list -digest-commands>. To see the list of supported digests, use the command I<list -digest-commands>.
=item B<cipher:string> =item B<cipher:>I<string>
Used by CMAC and GMAC to specify the cipher algorithm. Used by CMAC and GMAC to specify the cipher algorithm.
For CMAC it must be one of AES-128-CBC, AES-192-CBC, AES-256-CBC or For CMAC it must be one of AES-128-CBC, AES-192-CBC, AES-256-CBC or
DES-EDE3-CBC. DES-EDE3-CBC.
For GMAC it should be a GCM mode cipher e.g. AES-128-GCM. For GMAC it should be a GCM mode cipher e.g. AES-128-GCM.
=item B<iv:string> =item B<iv:>I<string>
Used by GMAC to specify an IV as an alphanumeric string (use if the IV contains Used by GMAC to specify an IV as an alphanumeric string (use if the IV contains
printable characters only). printable characters only).
=item B<hexiv:string> =item B<hexiv:>I<string>
Used by GMAC to specify an IV in hexadecimal form (two hex digits per byte). Used by GMAC to specify an IV in hexadecimal form (two hex digits per byte).
=item B<outlen:int> =item B<outlen:>I<int>
Used by KMAC128 or KMAC256 to specify an output length. Used by KMAC128 or KMAC256 to specify an output length.
The default sizes are 32 or 64 bytes respectively. The default sizes are 32 or 64 bytes respectively.
=item B<custom:string> =item B<custom:>I<string>
Used by KMAC128 or KMAC256 to specify a customization string. Used by KMAC128 or KMAC256 to specify a customization string.
The default is the empty string "". The default is the empty string "".
=back =back
=item B<mac_name> =item I<mac_name>
Specifies the name of a supported MAC algorithm which will be used. Specifies the name of a supported MAC algorithm which will be used.
To see the list of supported MAC's use the command I<list -mac-algorithms>. To see the list of supported MAC's use the command I<list -mac-algorithms>.
......
...@@ -26,7 +26,7 @@ B<openssl> B<ocsp> ...@@ -26,7 +26,7 @@ B<openssl> B<ocsp>
[B<-nonce>] [B<-nonce>]
[B<-no_nonce>] [B<-no_nonce>]
[B<-url> I<URL>] [B<-url> I<URL>]
[B<-host> I<host:port>] [B<-host> I<host>:I<port>]
[B<-multi> I<process-count>] [B<-multi> I<process-count>]
[B<-header>] [B<-header>]
[B<-path>] [B<-path>]
...@@ -121,27 +121,27 @@ specify output filename, default is standard output. ...@@ -121,27 +121,27 @@ specify output filename, default is standard output.
=item B<-issuer> I<filename> =item B<-issuer> I<filename>
This specifies the current issuer certificate. This option can be used This specifies the current issuer certificate. This option can be used
multiple times. The certificate specified in B<filename> must be in multiple times. The certificate specified in I<filename> must be in
PEM format. This option B<MUST> come before any B<-cert> options. PEM format. This option B<MUST> come before any B<-cert> options.
=item B<-cert> I<filename> =item B<-cert> I<filename>
Add the certificate B<filename> to the request. The issuer certificate Add the certificate I<filename> to the request. The issuer certificate
is taken from the previous B<issuer> option, or an error occurs if no is taken from the previous B<-issuer> option, or an error occurs if no
issuer certificate is specified. issuer certificate is specified.
=item B<-serial> I<num> =item B<-serial> I<num>
Same as the B<cert> option except the certificate with serial number Same as the B<-cert> option except the certificate with serial number
B<num> is added to the request. The serial number is interpreted as a B<num> is added to the request. The serial number is interpreted as a
decimal integer unless preceded by B<0x>. Negative integers can also decimal integer unless preceded by B<0x>. Negative integers can also
be specified by preceding the value by a B<-> sign. be specified by preceding the value by a B<-> sign.
=item B<-signer> I<filename>, B<-signkey> I<filename> =item B<-signer> I<filename>, B<-signkey> I<filename>
Sign the OCSP request using the certificate specified in the B<signer> Sign the OCSP request using the certificate specified in the B<-signer>
option and the private key specified by the B<signkey> option. If option and the private key specified by the B<-signkey> option. If
the B<signkey> option is not present then the private key is read the B<-signkey> option is not present then the private key is read
from the same file as the certificate. If neither option is specified then from the same file as the certificate. If neither option is specified then
the OCSP request is not signed. the OCSP request is not signed.
...@@ -152,10 +152,10 @@ Additional certificates to include in the signed request. ...@@ -152,10 +152,10 @@ Additional certificates to include in the signed request.
=item B<-nonce>, B<-no_nonce> =item B<-nonce>, B<-no_nonce>
Add an OCSP nonce extension to a request or disable OCSP nonce addition. Add an OCSP nonce extension to a request or disable OCSP nonce addition.
Normally if an OCSP request is input using the B<reqin> option no Normally if an OCSP request is input using the B<-reqin> option no
nonce is added: using the B<nonce> option will force addition of a nonce. nonce is added: using the B<-nonce> option will force addition of a nonce.
If an OCSP request is being created (using B<cert> and B<serial> options) If an OCSP request is being created (using B<-cert> and B<-serial> options)
a nonce is automatically added specifying B<no_nonce> overrides this. a nonce is automatically added specifying B<-no_nonce> overrides this.
=item B<-req_text>, B<-resp_text>, B<-text> =item B<-req_text>, B<-resp_text>, B<-text>
...@@ -163,28 +163,28 @@ Print out the text form of the OCSP request, response or both respectively. ...@@ -163,28 +163,28 @@ Print out the text form of the OCSP request, response or both respectively.
=item B<-reqout> I<file>, B<-respout> I<file> =item B<-reqout> I<file>, B<-respout> I<file>
Write out the DER encoded certificate request or response to B<file>. Write out the DER encoded certificate request or response to I<file>.
=item B<-reqin> I<file>, B<-respin> I<file> =item B<-reqin> I<file>, B<-respin> I<file>
Read OCSP request or response file from B<file>. These option are ignored Read OCSP request or response file from I<file>. These option are ignored
if OCSP request or response creation is implied by other options (for example if OCSP request or response creation is implied by other options (for example
with B<serial>, B<cert> and B<host> options). with B<-serial>, B<-cert> and B<-host> options).
=item B<-url> I<responder_url> =item B<-url> I<responder_url>
Specify the responder URL. Both HTTP and HTTPS (SSL/TLS) URLs can be specified. Specify the responder URL. Both HTTP and HTTPS (SSL/TLS) URLs can be specified.
=item B<-host> I<hostname:port>, B<-path> I<pathname> =item B<-host> I<hostname>:I<port>, B<-path> I<pathname>
If the B<host> option is present then the OCSP request is sent to the host If the B<-host> option is present then the OCSP request is sent to the host
B<hostname> on port B<port>. B<path> specifies the HTTP pathname to use I<hostname> on port I<port>. The B<-path> option specifies the HTTP pathname
or "/" by default. This is equivalent to specifying B<-url> with scheme to use or "/" by default. This is equivalent to specifying B<-url> with scheme
http:// and the given hostname, port, and pathname. http:// and the given hostname, port, and pathname.
=item B<-header> I<name=value> =item B<-header> I<name>=I<value>
Adds the header B<name> with the specified B<value> to the OCSP request Adds the header I<name> with the specified I<value> to the OCSP request
that is sent to the responder. that is sent to the responder.
This may be repeated. This may be repeated.
...@@ -303,7 +303,7 @@ seconds, the default value is 5 minutes. ...@@ -303,7 +303,7 @@ seconds, the default value is 5 minutes.
If the B<notAfter> time is omitted from a response then this means that new If the B<notAfter> time is omitted from a response then this means that new
status information is immediately available. In this case the age of the status information is immediately available. In this case the age of the
B<notBefore> field is checked to see it is not older than B<age> seconds old. B<notBefore> field is checked to see it is not older than I<age> seconds old.
By default this additional check is not performed. By default this additional check is not performed.
=item B<-rcid> I<digest> =item B<-rcid> I<digest>
...@@ -327,21 +327,22 @@ digest used by subsequent certificate identifiers. ...@@ -327,21 +327,22 @@ digest used by subsequent certificate identifiers.
=item B<-index> I<indexfile> =item B<-index> I<indexfile>
The B<indexfile> parameter is the name of a text index file in B<ca> The I<indexfile> parameter is the name of a text index file in B<ca>
format containing certificate revocation information. format containing certificate revocation information.
If the B<index> option is specified the B<ocsp> utility is in responder If the B<-index> option is specified the B<ocsp> utility is in responder
mode, otherwise it is in client mode. The request(s) the responder mode, otherwise it is in client mode. The request(s) the responder
processes can be either specified on the command line (using B<issuer> processes can be either specified on the command line (using B<-issuer>
and B<serial> options), supplied in a file (using the B<reqin> option) and B<-serial> options), supplied in a file (using the B<-reqin> option)
or via external OCSP clients (if B<port> or B<url> is specified). or via external OCSP clients (if B<-port> or B<-url> is specified).
If the B<index> option is present then the B<CA> and B<rsigner> options If the B<-index> option is present then the B<-CA> and B<-rsigner> options
must also be present. must also be present.
=item B<-CA> I<file> =item B<-CA> I<file>
CA certificate corresponding to the revocation information in B<indexfile>. CA certificate corresponding to the revocation information in the index
file given with B<-index>.
=item B<-rsigner> I<file> =item B<-rsigner> I<file>
...@@ -363,7 +364,7 @@ subject name. ...@@ -363,7 +364,7 @@ subject name.
=item B<-rkey> I<file> =item B<-rkey> I<file>
The private key to sign OCSP responses with: if not present the file The private key to sign OCSP responses with: if not present the file
specified in the B<rsigner> option is used. specified in the B<-rsigner> option is used.
=item B<-rsigopt> I<nm>:I<v> =item B<-rsigopt> I<nm>:I<v>
...@@ -383,7 +384,7 @@ running instead of terminating upon receiving a malformed request. ...@@ -383,7 +384,7 @@ running instead of terminating upon receiving a malformed request.
=item B<-nrequest> I<number> =item B<-nrequest> I<number>
The OCSP server will exit after receiving B<number> requests, default unlimited. The OCSP server will exit after receiving I<number> requests, default unlimited.
=item B<-nmin> I<minutes>, B<-ndays> I<days> =item B<-nmin> I<minutes>, B<-ndays> I<days>
...@@ -403,8 +404,8 @@ the OCSP request checked using the responder certificate's public key. ...@@ -403,8 +404,8 @@ the OCSP request checked using the responder certificate's public key.
Then a normal certificate verify is performed on the OCSP responder certificate Then a normal certificate verify is performed on the OCSP responder certificate
building up a certificate chain in the process. The locations of the trusted building up a certificate chain in the process. The locations of the trusted
certificates used to build the chain can be specified by the B<CAfile> certificates used to build the chain can be specified by the B<-CAfile>
and B<CApath> options or they will be looked for in the standard OpenSSL and B<-CApath> options or they will be looked for in the standard OpenSSL
certificates directory. certificates directory.
If the initial verify fails then the OCSP verify process halts with an If the initial verify fails then the OCSP verify process halts with an
...@@ -452,7 +453,7 @@ format of revocation is also inefficient for large quantities of revocation ...@@ -452,7 +453,7 @@ format of revocation is also inefficient for large quantities of revocation
data. data.
It is possible to run the B<ocsp> application in responder mode via a CGI It is possible to run the B<ocsp> application in responder mode via a CGI
script using the B<reqin> and B<respout> options. script using the B<-reqin> and B<-respout> options.
=head1 EXAMPLES =head1 EXAMPLES
......
...@@ -32,8 +32,9 @@ The B<passwd> command computes the hash of a password typed at ...@@ -32,8 +32,9 @@ The B<passwd> command computes the hash of a password typed at
run-time or the hash of each password in a list. The password list is run-time or the hash of each password in a list. The password list is
taken from the named file for option B<-in>, from stdin for taken from the named file for option B<-in>, from stdin for
option B<-stdin>, or from the command line, or from the terminal otherwise. option B<-stdin>, or from the command line, or from the terminal otherwise.
The Unix standard algorithm B<crypt> and the MD5-based BSD password The Unix standard algorithm B<-crypt> and the MD5-based BSD password
algorithm B<1>, its Apache variant B<apr1>, and its AIX variant are available. algorithm B<-1>, its Apache variant B<-apr1>, and its AIX variant are
available.
=head1 OPTIONS =head1 OPTIONS
......
...@@ -79,13 +79,13 @@ default. They are all written in PEM format. ...@@ -79,13 +79,13 @@ default. They are all written in PEM format.
=item B<-passin> I<arg> =item B<-passin> I<arg>
The PKCS#12 file (i.e. input file) password source. For more information about The PKCS#12 file (i.e. input file) password source. For more information about
the format of B<arg> the format of I<arg>
see L<openssl(1)/Pass phrase options>. see L<openssl(1)/Pass phrase options>.
=item B<-passout> I<arg> =item B<-passout> I<arg>
Pass phrase source to encrypt any outputted private keys with. For more Pass phrase source to encrypt any outputted private keys with. For more
information about the format of B<arg> see the B<PASS PHRASE ARGUMENTS> section information about the format of I<arg> see the B<PASS PHRASE ARGUMENTS> section
in L<openssl(1)>. in L<openssl(1)>.
=item B<-password> I<arg> =item B<-password> I<arg>
...@@ -207,13 +207,13 @@ displays them. ...@@ -207,13 +207,13 @@ displays them.
=item B<-pass> I<arg>, B<-passout> I<arg> =item B<-pass> I<arg>, B<-passout> I<arg>
The PKCS#12 file (i.e. output file) password source. For more information about The PKCS#12 file (i.e. output file) password source. For more information about
the format of B<arg> see the B<PASS PHRASE ARGUMENTS> section in the format of I<arg> see the B<PASS PHRASE ARGUMENTS> section in
L<openssl(1)>. L<openssl(1)>.
=item B<-passin> I<password> =item B<-passin> I<password>
Pass phrase source to decrypt any input private keys with. For more information Pass phrase source to decrypt any input private keys with. For more information
about the format of B<arg> see the B<PASS PHRASE ARGUMENTS> section in about the format of I<arg> see the B<PASS PHRASE ARGUMENTS> section in
L<openssl(1)>. L<openssl(1)>.
=item B<-chain> =item B<-chain>
...@@ -312,7 +312,7 @@ Do not load the trusted CA certificates from the default directory location. ...@@ -312,7 +312,7 @@ Do not load the trusted CA certificates from the default directory location.
=item B<-CSP> I<name> =item B<-CSP> I<name>
Write B<name> as a Microsoft CSP name. Write I<name> as a Microsoft CSP name.
=back =back
......
...@@ -75,7 +75,7 @@ prompted for. ...@@ -75,7 +75,7 @@ prompted for.
=item B<-passin> I<arg> =item B<-passin> I<arg>
The input file password source. For more information about the format of B<arg> The input file password source. For more information about the format of I<arg>
see L<openssl(1)/Pass phrase options>. see L<openssl(1)/Pass phrase options>.
=item B<-out> I<filename> =item B<-out> I<filename>
...@@ -87,7 +87,7 @@ filename. ...@@ -87,7 +87,7 @@ filename.
=item B<-passout> I<arg> =item B<-passout> I<arg>
The output file password source. For more information about the format of B<arg> The output file password source. For more information about the format of I<arg>
see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)>. see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)>.
=item B<-iter> I<count> =item B<-iter> I<count>
...@@ -121,7 +121,7 @@ This can be used with a subsequent B<-rand> flag. ...@@ -121,7 +121,7 @@ This can be used with a subsequent B<-rand> flag.
This option sets the PKCS#5 v2.0 algorithm. This option sets the PKCS#5 v2.0 algorithm.
The B<alg> argument is the encryption algorithm to use, valid values include The I<alg> argument is the encryption algorithm to use, valid values include
B<aes128>, B<aes256> and B<des3>. If this option isn't specified then B<aes256> B<aes128>, B<aes256> and B<des3>. If this option isn't specified then B<aes256>
is used. is used.
...@@ -142,7 +142,7 @@ If not specified PKCS#5 v2.0 form is used. ...@@ -142,7 +142,7 @@ If not specified PKCS#5 v2.0 form is used.
=item B<-engine> I<id> =item B<-engine> I<id>
Specifying an engine (by its unique B<id> string) will cause B<pkcs8> Specifying an engine (by its unique I<id> string) will cause B<pkcs8>
to attempt to obtain a functional reference to the specified engine, to attempt to obtain a functional reference to the specified engine,
thus initialising it if needed. The engine will then be set as the default thus initialising it if needed. The engine will then be set as the default
for all available algorithms. for all available algorithms.
...@@ -156,7 +156,7 @@ B<-scrypt_p> and B<-v2> options. ...@@ -156,7 +156,7 @@ B<-scrypt_p> and B<-v2> options.
=item B<-scrypt_N> I<N>, B<-scrypt_r> I<r>, B<-scrypt_p> I<p> =item B<-scrypt_N> I<N>, B<-scrypt_r> I<r>, B<-scrypt_p> I<p>
Sets the scrypt B<N>, B<r> or B<p> parameters. Sets the scrypt I<N>, I<r> or I<p> parameters.
=back =back
......
...@@ -57,7 +57,7 @@ prompted for. ...@@ -57,7 +57,7 @@ prompted for.
=item B<-passin> I<arg> =item B<-passin> I<arg>
The input file password source. For more information about the format of B<arg> The input file password source. For more information about the format of I<arg>
see L<openssl(1)/Pass phrase options>. see L<openssl(1)/Pass phrase options>.
=item B<-out> I<filename> =item B<-out> I<filename>
...@@ -67,9 +67,9 @@ option is not specified. If any encryption options are set then a pass phrase ...@@ -67,9 +67,9 @@ option is not specified. If any encryption options are set then a pass phrase
will be prompted for. The output filename should B<not> be the same as the input will be prompted for. The output filename should B<not> be the same as the input
filename. filename.
=item B<-passout> I<password> =item B<-passout> I<arg>
The output file password source. For more information about the format of B<arg> The output file password source. For more information about the format of I<arg>
see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)>. see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)>.
=item B<-traditional> =item B<-traditional>
...@@ -109,7 +109,7 @@ the input is a public key. ...@@ -109,7 +109,7 @@ the input is a public key.
=item B<-engine> I<id> =item B<-engine> I<id>
Specifying an engine (by its unique B<id> string) will cause B<pkey> Specifying an engine (by its unique I<id> string) will cause B<pkey>
to attempt to obtain a functional reference to the specified engine, to attempt to obtain a functional reference to the specified engine,
thus initialising it if needed. The engine will then be set as the default thus initialising it if needed. The engine will then be set as the default
for all available algorithms. for all available algorithms.
......
...@@ -50,7 +50,7 @@ Do not output the encoded version of the parameters. ...@@ -50,7 +50,7 @@ Do not output the encoded version of the parameters.
=item B<-engine> I<id> =item B<-engine> I<id>
Specifying an engine (by its unique B<id> string) will cause B<pkeyparam> Specifying an engine (by its unique I<id> string) will cause B<pkeyparam>
to attempt to obtain a functional reference to the specified engine, to attempt to obtain a functional reference to the specified engine,
thus initialising it if needed. The engine will then be set as the default thus initialising it if needed. The engine will then be set as the default
for all available algorithms. for all available algorithms.
......
...@@ -29,8 +29,8 @@ B<openssl> B<pkeyutl> ...@@ -29,8 +29,8 @@ B<openssl> B<pkeyutl>
[B<-derive>] [B<-derive>]
[B<-kdf> I<algorithm>] [B<-kdf> I<algorithm>]
[B<-kdflen> I<length>] [B<-kdflen> I<length>]
[B<-pkeyopt> I<opt:value>] [B<-pkeyopt> I<opt>:I<value>]
[B<-pkeyopt_passin> I<opt:passarg>] [B<-pkeyopt_passin> I<opt>[:I<passarg>]]
[B<-hexdump>] [B<-hexdump>]
[B<-asn1parse>] [B<-asn1parse>]
[B<-rand> I<files>] [B<-rand> I<files>]
...@@ -82,7 +82,7 @@ default. ...@@ -82,7 +82,7 @@ default.
=item B<-sigfile> I<file> =item B<-sigfile> I<file>
Signature file, required for B<verify> operations only Signature file, required for B<-verify> operations only
=item B<-inkey> I<file> =item B<-inkey> I<file>
...@@ -94,7 +94,7 @@ The key format PEM, DER or ENGINE. Default is PEM. ...@@ -94,7 +94,7 @@ The key format PEM, DER or ENGINE. Default is PEM.
=item B<-passin> I<arg> =item B<-passin> I<arg>
The input key password source. For more information about the format of B<arg> The input key password source. For more information about the format of I<arg>
see L<openssl(1)/Pass phrase options>. see L<openssl(1)/Pass phrase options>.
=item B<-peerkey> I<file> =item B<-peerkey> I<file>
...@@ -103,7 +103,7 @@ The peer key file, used by key derivation (agreement) operations. ...@@ -103,7 +103,7 @@ The peer key file, used by key derivation (agreement) operations.
=item B<-peerform> B<DER>|B<PEM>|B<ENGINE> =item B<-peerform> B<DER>|B<PEM>|B<ENGINE>
The peer key format PEM, DER or ENGINE. Default is PEM. The peer key format B<PEM>, B<DER> or B<ENGINE>. Default is B<PEM>.
=item B<-pubin> =item B<-pubin>
...@@ -146,7 +146,7 @@ Derive a shared secret using the peer key. ...@@ -146,7 +146,7 @@ Derive a shared secret using the peer key.
=item B<-kdf> I<algorithm> =item B<-kdf> I<algorithm>
Use key derivation function B<algorithm>. The supported algorithms are Use key derivation function I<algorithm>. The supported algorithms are
at present B<TLS1-PRF> and B<HKDF>. at present B<TLS1-PRF> and B<HKDF>.
Note: additional parameters and the KDF output length will normally have to be Note: additional parameters and the KDF output length will normally have to be
set for this to work. set for this to work.
...@@ -157,16 +157,16 @@ for the supported string parameters of each algorithm. ...@@ -157,16 +157,16 @@ for the supported string parameters of each algorithm.
Set the output length for KDF. Set the output length for KDF.
=item B<-pkeyopt> I<opt:value> =item B<-pkeyopt> I<opt>:I<value>
Public key options specified as opt:value. See NOTES below for more details. Public key options specified as opt:value. See NOTES below for more details.
=item B<-pkeyopt_passin> I<opt:passarg> =item B<-pkeyopt_passin> I<opt>[:I<passarg>]
Allows reading a public key option B<opt> from stdin or a password source. If Allows reading a public key option I<opt> from stdin or a password source.
only opt is specified, the user will be prompted to enter the value on stdin. If only I<opt> is specified, the user will be prompted to enter a password on
Alternatively, passarg can be specified which can be any value supported by stdin. Alternatively, I<passarg> can be specified which can be any value
B<PASS PHRASE ARGUMENTS> in L<openssl(1)>. supported by B<PASS PHRASE ARGUMENTS> in L<openssl(1)>.
=item B<-hexdump> =item B<-hexdump>
...@@ -191,7 +191,7 @@ This can be used with a subsequent B<-rand> flag. ...@@ -191,7 +191,7 @@ This can be used with a subsequent B<-rand> flag.
=item B<-engine> I<id> =item B<-engine> I<id>
Specifying an engine (by its unique B<id> string) will cause B<pkeyutl> Specifying an engine (by its unique I<id> string) will cause B<pkeyutl>
to attempt to obtain a functional reference to the specified engine, to attempt to obtain a functional reference to the specified engine,
thus initialising it if needed. The engine will then be set as the default thus initialising it if needed. The engine will then be set as the default
for all available algorithms. for all available algorithms.
...@@ -199,7 +199,7 @@ for all available algorithms. ...@@ -199,7 +199,7 @@ for all available algorithms.
=item B<-engine_impl> =item B<-engine_impl>
When used with the B<-engine> option, it specifies to also use When used with the B<-engine> option, it specifies to also use
engine B<id> for crypto operations. engine I<id> for crypto operations.
=back =back
...@@ -208,9 +208,9 @@ engine B<id> for crypto operations. ...@@ -208,9 +208,9 @@ engine B<id> for crypto operations.
The operations and options supported vary according to the key algorithm The operations and options supported vary according to the key algorithm
and its implementation. The OpenSSL operations and options are indicated below. and its implementation. The OpenSSL operations and options are indicated below.
Unless otherwise mentioned all algorithms support the B<digest:alg> option Unless otherwise mentioned all algorithms support the B<digest:>I<alg> option
which specifies the digest in use for sign, verify and verifyrecover operations. which specifies the digest in use for sign, verify and verifyrecover operations.
The value B<alg> should represent a digest name as used in the The value I<alg> should represent a digest name as used in the
EVP_get_digestbyname() function for example B<sha1>. This value is not used to EVP_get_digestbyname() function for example B<sha1>. This value is not used to
hash the input data. It is used (by some algorithms) for sanity-checking the hash the input data. It is used (by some algorithms) for sanity-checking the
lengths of data passed in to the B<pkeyutl> and for creating the structures that lengths of data passed in to the B<pkeyutl> and for creating the structures that
...@@ -237,9 +237,9 @@ B<pkeyopt> values are supported: ...@@ -237,9 +237,9 @@ B<pkeyopt> values are supported:
=over 4 =over 4
=item B<rsa_padding_mode:mode> =item B<rsa_padding_mode:>I<mode>
This sets the RSA padding mode. Acceptable values for B<mode> are B<pkcs1> for This sets the RSA padding mode. Acceptable values for I<mode> are B<pkcs1> for
PKCS#1 padding, B<sslv23> for SSLv23 padding, B<none> for no padding, B<oaep> PKCS#1 padding, B<sslv23> for SSLv23 padding, B<none> for no padding, B<oaep>
for B<OAEP> mode, B<x931> for X9.31 mode and B<pss> for PSS. for B<OAEP> mode, B<x931> for X9.31 mode and B<pss> for PSS.
...@@ -257,15 +257,15 @@ verify and verifyrecover are can be performed in this mode. ...@@ -257,15 +257,15 @@ verify and verifyrecover are can be performed in this mode.
For B<pss> mode only sign and verify are supported and the digest type must be For B<pss> mode only sign and verify are supported and the digest type must be
specified. specified.
=item B<rsa_pss_saltlen:len> =item B<rsa_pss_saltlen:>I<len>
For B<pss> mode only this option specifies the salt length. Three special For B<pss> mode only this option specifies the salt length. Three special
values are supported: "digest" sets the salt length to the digest length, values are supported: B<digest> sets the salt length to the digest length,
"max" sets the salt length to the maximum permissible value. When verifying B<max> sets the salt length to the maximum permissible value. When verifying
"auto" causes the salt length to be automatically determined based on the B<auto> causes the salt length to be automatically determined based on the
B<PSS> block structure. B<PSS> block structure.
=item B<rsa_mgf1_md:digest> =item B<rsa_mgf1_md:>I<digest>
For PSS and OAEP padding sets the MGF1 digest. If the MGF1 digest is not For PSS and OAEP padding sets the MGF1 digest. If the MGF1 digest is not
explicitly set in PSS mode then the signing digest is used. explicitly set in PSS mode then the signing digest is used.
...@@ -276,11 +276,12 @@ explicitly set in PSS mode then the signing digest is used. ...@@ -276,11 +276,12 @@ explicitly set in PSS mode then the signing digest is used.
The RSA-PSS algorithm is a restricted version of the RSA algorithm which only The RSA-PSS algorithm is a restricted version of the RSA algorithm which only
supports the sign and verify operations with PSS padding. The following supports the sign and verify operations with PSS padding. The following
additional B<pkeyopt> values are supported: additional B<-pkeyopt> values are supported:
=over 4 =over 4
=item B<rsa_padding_mode:mode>, B<rsa_pss_saltlen:len>, B<rsa_mgf1_md:digest> =item B<rsa_padding_mode:>I<mode>, B<rsa_pss_saltlen:>I<len>,
B<rsa_mgf1_md:>I<digest>
These have the same meaning as the B<RSA> algorithm with some additional These have the same meaning as the B<RSA> algorithm with some additional
restrictions. The padding mode can only be set to B<pss> which is the restrictions. The padding mode can only be set to B<pss> which is the
...@@ -319,8 +320,8 @@ no additional options. ...@@ -319,8 +320,8 @@ no additional options.
These algorithms only support signing and verifying. OpenSSL only implements the These algorithms only support signing and verifying. OpenSSL only implements the
"pure" variants of these algorithms so raw data can be passed directly to them "pure" variants of these algorithms so raw data can be passed directly to them
without hashing them first. The option "-rawin" must be used with these without hashing them first. The option B<-rawin> must be used with these
algorithms with no "-digest" specified. Additionally OpenSSL only supports algorithms with no B<-digest> specified. Additionally OpenSSL only supports
"oneshot" operation with these algorithms. This means that the entire file to "oneshot" operation with these algorithms. This means that the entire file to
be signed/verified must be read into memory before processing it. Signing or be signed/verified must be read into memory before processing it. Signing or
Verifying very large files should be avoided. Additionally the size of the file Verifying very large files should be avoided. Additionally the size of the file
...@@ -331,17 +332,17 @@ must be known for this to work. If the size of the file cannot be determined ...@@ -331,17 +332,17 @@ must be known for this to work. If the size of the file cannot be determined
The SM2 algorithm supports sign, verify, encrypt and decrypt operations. For The SM2 algorithm supports sign, verify, encrypt and decrypt operations. For
the sign and verify operations, SM2 requires an ID string to be passed in. The the sign and verify operations, SM2 requires an ID string to be passed in. The
following B<pkeyopt> value is supported: following B<-pkeyopt> value is supported:
=over 4 =over 4
=item B<sm2_id:string> =item B<sm2_id:>I<string>
This sets the ID string used in SM2 sign or verify operations. While verifying This sets the ID string used in SM2 sign or verify operations. While verifying
an SM2 signature, the ID string must be the same one used when signing the data. an SM2 signature, the ID string must be the same one used when signing the data.
Otherwise the verification will fail. Otherwise the verification will fail.
=item B<sm2_hex_id:hex_string> =item B<sm2_hex_id:>I<hex_string>
This sets the ID string used in SM2 sign or verify operations. While verifying This sets the ID string used in SM2 sign or verify operations. While verifying
an SM2 signature, the ID string must be the same one used when signing the data. an SM2 signature, the ID string must be the same one used when signing the data.
......
...@@ -41,16 +41,16 @@ Generate a prime number. ...@@ -41,16 +41,16 @@ Generate a prime number.
=item B<-bits> I<num> =item B<-bits> I<num>
Generate a prime with B<num> bits. Generate a prime with I<num> bits.
=item B<-safe> =item B<-safe>
When used with B<-generate>, generates a "safe" prime. If the number When used with B<-generate>, generates a "safe" prime. If the number
generated is B<n>, then check that B<(n-1)/2> is also prime. generated is I<n>, then check that C<(I<n>-1)/2> is also prime.
=item B<-checks> I<num> =item B<-checks> I<num>
Perform the checks B<num> times to see that the generated number Perform the checks I<num> times to see that the generated number
is prime. The default is 20. is prime. The default is 20.
=back =back
......
...@@ -45,17 +45,17 @@ but often B</usr/local/ssl/certs>) is processed. ...@@ -45,17 +45,17 @@ but often B</usr/local/ssl/certs>) is processed.
In order for a directory to be processed, the user must have write In order for a directory to be processed, the user must have write
permissions on that directory, otherwise an error will be generated. permissions on that directory, otherwise an error will be generated.
The links created are of the form C<HHHHHHHH.D>, where each B<H> The links created are of the form I<HHHHHHHH.D>, where each I<H>
is a hexadecimal character and B<D> is a single decimal digit. is a hexadecimal character and I<D> is a single decimal digit.
When processing a directory, B<rehash> will first remove all links When processing a directory, B<rehash> will first remove all links
that have a name in that syntax, even if they are being used for some that have a name in that syntax, even if they are being used for some
other purpose. other purpose.
To skip the removal step, use the B<-n> flag. To skip the removal step, use the B<-n> flag.
Hashes for CRL's look similar except the letter B<r> appears after Hashes for CRL's look similar except the letter B<r> appears after
the period, like this: C<HHHHHHHH.rD>. the period, like this: I<HHHHHHHH.>B<r>I<D>.
Multiple objects may have the same hash; they will be indicated by Multiple objects may have the same hash; they will be indicated by
incrementing the B<D> value. Duplicates are found by comparing the incrementing the I<D> value. Duplicates are found by comparing the
full SHA-1 fingerprint. A warning will be displayed if a duplicate full SHA-1 fingerprint. A warning will be displayed if a duplicate
is found. is found.
...@@ -75,7 +75,7 @@ a certificate or CRL: ...@@ -75,7 +75,7 @@ a certificate or CRL:
$OPENSSL x509 -hash -fingerprint -noout -in FILENAME $OPENSSL x509 -hash -fingerprint -noout -in FILENAME
$OPENSSL crl -hash -fingerprint -noout -in FILENAME $OPENSSL crl -hash -fingerprint -noout -in FILENAME
where B<FILENAME> is the filename. It must output the hash of the where I<FILENAME> is the filename. It must output the hash of the
file on the first line, and the fingerprint on the second, file on the first line, and the fingerprint on the second,
optionally prefixed with some text and an equals sign. optionally prefixed with some text and an equals sign.
......
...@@ -22,8 +22,7 @@ B<openssl> B<req> ...@@ -22,8 +22,7 @@ B<openssl> B<req>
[B<-new>] [B<-new>]
[B<-rand> I<files>] [B<-rand> I<files>]
[B<-writerand> I<file>] [B<-writerand> I<file>]
[B<-newkey> I<rsa:bits>] [B<-newkey> I<arg>]
[B<-newkey> I<alg:file>]
[B<-nodes>] [B<-nodes>]
[B<-key> I<filename>] [B<-key> I<filename>]
[B<-keyform> B<DER>|B<PEM>] [B<-keyform> B<DER>|B<PEM>]
...@@ -103,7 +102,7 @@ default. ...@@ -103,7 +102,7 @@ default.
=item B<-passout> I<arg> =item B<-passout> I<arg>
The output file password source. For more information about the format of B<arg> The output file password source. For more information about the format of I<arg>
see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)>. see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)>.
=item B<-text> =item B<-text>
...@@ -157,32 +156,33 @@ This can be used with a subsequent B<-rand> flag. ...@@ -157,32 +156,33 @@ This can be used with a subsequent B<-rand> flag.
=item B<-newkey> I<arg> =item B<-newkey> I<arg>
This option creates a new certificate request and a new private This option creates a new certificate request and a new private
key. The argument takes one of several forms. B<rsa:nbits>, where key. The argument takes one of several forms.
B<nbits> is the number of bits, generates an RSA key B<nbits>
in size. If B<nbits> is omitted, i.e. B<-newkey> I<rsa> specified, B<rsa:>I<nbits>, where
I<nbits> is the number of bits, generates an RSA key I<nbits>
in size. If I<nbits> is omitted, i.e. B<-newkey> I<rsa> specified,
the default key size, specified in the configuration file is used. the default key size, specified in the configuration file is used.
All other algorithms support the B<-newkey> I<alg:file> form, where file may be All other algorithms support the B<-newkey> I<alg>:I<file> form, where file
an algorithm parameter file, created by the B<genpkey -genparam> command may be an algorithm parameter file, created with B<genpkey -genparam>
or and X.509 certificate for a key with appropriate algorithm. or an X.509 certificate for a key with appropriate algorithm.
B<param:file> generates a key using the parameter file or certificate B<file>, B<param:>I<file> generates a key using the parameter file or certificate
the algorithm is determined by the parameters. B<algname:file> use algorithm I<file>, the algorithm is determined by the parameters. I<algname>:I<file>
B<algname> and parameter file B<file>: the two algorithms must match or an use algorithm I<algname> and parameter file I<file>: the two algorithms must
error occurs. B<algname> just uses algorithm B<algname>, and parameters, match or an error occurs. I<algname> just uses algorithm I<algname>, and
if necessary should be specified via B<-pkeyopt> parameter. parameters, if necessary should be specified via B<-pkeyopt> parameter.
B<dsa:filename> generates a DSA key using the parameters B<dsa:>I<filename> generates a DSA key using the parameters
in the file B<filename>. B<ec:filename> generates EC key (usable both with in the file I<filename>. B<ec:>I<filename> generates EC key (usable both with
ECDSA or ECDH algorithms), B<gost2001:filename> generates GOST R ECDSA or ECDH algorithms), B<gost2001:>I<filename> generates GOST R
34.10-2001 key (requires B<ccgost> engine configured in the configuration 34.10-2001 key (requires B<gost> engine configured in the configuration
file). If just B<gost2001> is specified a parameter set should be file). If just B<gost2001> is specified a parameter set should be
specified by B<-pkeyopt> I<paramset:X> specified by B<-pkeyopt> I<paramset:X>
=item B<-pkeyopt> I<opt>:I<value>
=item B<-pkeyopt> I<opt:value> Set the public key algorithm option I<opt> to I<value>. The precise set of
Set the public key algorithm option B<opt> to B<value>. The precise set of
options supported depends on the public key algorithm used and its options supported depends on the public key algorithm used and its
implementation. See B<KEY GENERATION OPTIONS> in the B<genpkey> manual page implementation. See B<KEY GENERATION OPTIONS> in the B<genpkey> manual page
for more details. for more details.
...@@ -249,7 +249,7 @@ This option outputs a self signed certificate instead of a certificate ...@@ -249,7 +249,7 @@ This option outputs a self signed certificate instead of a certificate
request. This is typically used to generate a test certificate or request. This is typically used to generate a test certificate or
a self signed root CA. The extensions added to the certificate a self signed root CA. The extensions added to the certificate
(if any) are specified in the configuration file. Unless specified (if any) are specified in the configuration file. Unless specified
using the B<set_serial> option, a large random number will be used for using the B<-set_serial> option, a large random number will be used for
the serial number. the serial number.
If existing request is specified with the B<-in> option, it is converted If existing request is specified with the B<-in> option, it is converted
...@@ -258,7 +258,7 @@ to the self signed certificate otherwise new request is created. ...@@ -258,7 +258,7 @@ to the self signed certificate otherwise new request is created.
=item B<-days> I<n> =item B<-days> I<n>
When the B<-x509> option is being used this specifies the number of When the B<-x509> option is being used this specifies the number of
days to certify the certificate for, otherwise it is ignored. B<n> should days to certify the certificate for, otherwise it is ignored. I<n> should
be a positive integer. The default is 30 days. be a positive integer. The default is 30 days.
=item B<-set_serial> I<n> =item B<-set_serial> I<n>
...@@ -304,13 +304,13 @@ configuration file, must be valid UTF8 strings. ...@@ -304,13 +304,13 @@ configuration file, must be valid UTF8 strings.
=item B<-nameopt> I<option> =item B<-nameopt> I<option>
Option which determines how the subject or issuer names are displayed. The Option which determines how the subject or issuer names are displayed. The
B<option> argument can be a single option or multiple options separated by I<option> argument can be a single option or multiple options separated by
commas. Alternatively the B<-nameopt> switch may be used more than once to commas. Alternatively the B<-nameopt> switch may be used more than once to
set multiple options. See the L<x509(1)> manual page for details. set multiple options. See the L<x509(1)> manual page for details.
=item B<-reqopt> =item B<-reqopt> I<option>
Customise the output format used with B<-text>. The B<option> argument can be Customise the output format used with B<-text>. The I<option> argument can be
a single option or multiple options separated by commas. a single option or multiple options separated by commas.
See discussion of the B<-certopt> parameter in the L<x509(1)> See discussion of the B<-certopt> parameter in the L<x509(1)>
...@@ -331,14 +331,14 @@ Print extra details about the operations being performed. ...@@ -331,14 +331,14 @@ Print extra details about the operations being performed.
=item B<-engine> I<id> =item B<-engine> I<id>
Specifying an engine (by its unique B<id> string) will cause B<req> Specifying an engine (by its unique I<id> string) will cause B<req>
to attempt to obtain a functional reference to the specified engine, to attempt to obtain a functional reference to the specified engine,
thus initialising it if needed. The engine will then be set as the default thus initialising it if needed. The engine will then be set as the default
for all available algorithms. for all available algorithms.
=item B<-keygen_engine> I<id> =item B<-keygen_engine> I<id>
Specifies an engine (by its unique B<id> string) which would be used Specifies an engine (by its unique I<id> string) which would be used
for key generation operations. for key generation operations.
=item B<-sm2-id> =item B<-sm2-id>
......
...@@ -75,7 +75,7 @@ prompted for. ...@@ -75,7 +75,7 @@ prompted for.
=item B<-passin> I<arg> =item B<-passin> I<arg>
The input file password source. For more information about the format of B<arg> The input file password source. For more information about the format of I<arg>
see L<openssl(1)/Pass phrase options>. see L<openssl(1)/Pass phrase options>.
=item B<-out> I<filename> =item B<-out> I<filename>
...@@ -85,9 +85,9 @@ option is not specified. If any encryption options are set then a pass phrase ...@@ -85,9 +85,9 @@ option is not specified. If any encryption options are set then a pass phrase
will be prompted for. The output filename should B<not> be the same as the input will be prompted for. The output filename should B<not> be the same as the input
filename. filename.
=item B<-passout> I<password> =item B<-passout> I<arg>
The output file password source. For more information about the format of B<arg> The output file password source. For more information about the format of I<arg>
see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)>. see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)>.
=item B<-aes128>, B<-aes192>, B<-aes256>, B<-aria128>, B<-aria192>, B<-aria256>, B<-camellia128>, B<-camellia192>, B<-camellia256>, B<-des>, B<-des3>, B<-idea> =item B<-aes128>, B<-aes192>, B<-aes256>, B<-aria128>, B<-aria192>, B<-aria256>, B<-camellia128>, B<-camellia192>, B<-camellia256>, B<-des>, B<-des3>, B<-idea>
...@@ -134,7 +134,7 @@ Like B<-pubin> and B<-pubout> except B<RSAPublicKey> format is used instead. ...@@ -134,7 +134,7 @@ Like B<-pubin> and B<-pubout> except B<RSAPublicKey> format is used instead.
=item B<-engine> I<id> =item B<-engine> I<id>
Specifying an engine (by its unique B<id> string) will cause B<rsa> Specifying an engine (by its unique I<id> string) will cause B<rsa>
to attempt to obtain a functional reference to the specified engine, to attempt to obtain a functional reference to the specified engine,
thus initialising it if needed. The engine will then be set as the default thus initialising it if needed. The engine will then be set as the default
for all available algorithms. for all available algorithms.
......
...@@ -283,7 +283,7 @@ Extra certificate and private key format respectively. ...@@ -283,7 +283,7 @@ Extra certificate and private key format respectively.
=item B<-pass> I<arg> =item B<-pass> I<arg>
the private key password source. For more information about the format of B<arg> the private key password source. For more information about the format of I<arg>
see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)>. see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)>.
=item B<-verify> I<depth> =item B<-verify> I<depth>
...@@ -302,7 +302,7 @@ abort the handshake with a fatal error. ...@@ -302,7 +302,7 @@ abort the handshake with a fatal error.
=item B<-nameopt> I<option> =item B<-nameopt> I<option>
Option which determines how the subject or issuer names are displayed. The Option which determines how the subject or issuer names are displayed. The
B<option> argument can be a single option or multiple options separated by I<option> argument can be a single option or multiple options separated by
commas. Alternatively the B<-nameopt> switch may be used more than once to commas. Alternatively the B<-nameopt> switch may be used more than once to
set multiple options. See the L<x509(1)> manual page for details. set multiple options. See the L<x509(1)> manual page for details.
...@@ -360,7 +360,7 @@ at a positive depth or else "matched EE certificate" at depth 0. ...@@ -360,7 +360,7 @@ at a positive depth or else "matched EE certificate" at depth 0.
=item B<-dane_tlsa_rrdata> I<rrdata> =item B<-dane_tlsa_rrdata> I<rrdata>
Use one or more times to specify the RRDATA fields of the DANE TLSA Use one or more times to specify the RRDATA fields of the DANE TLSA
RRset associated with the target service. The B<rrdata> value is RRset associated with the target service. The I<rrdata> value is
specied in "presentation form", that is four whitespace separated specied in "presentation form", that is four whitespace separated
fields that specify the usage, selector, matching type and associated fields that specify the usage, selector, matching type and associated
data, with the last of these encoded in hexadecimal. Optional data, with the last of these encoded in hexadecimal. Optional
...@@ -481,19 +481,19 @@ Can be used to override the implicit B<-ign_eof> after B<-quiet>. ...@@ -481,19 +481,19 @@ Can be used to override the implicit B<-ign_eof> after B<-quiet>.
=item B<-psk_identity> I<identity> =item B<-psk_identity> I<identity>
Use the PSK identity B<identity> when using a PSK cipher suite. Use the PSK identity I<identity> when using a PSK cipher suite.
The default value is "Client_identity" (without the quotes). The default value is "Client_identity" (without the quotes).
=item B<-psk> I<key> =item B<-psk> I<key>
Use the PSK key B<key> when using a PSK cipher suite. The key is Use the PSK key I<key> when using a PSK cipher suite. The key is
given as a hexadecimal number without leading 0x, for example -psk given as a hexadecimal number without leading 0x, for example -psk
1a2b3c4d. 1a2b3c4d.
This option must be provided in order to use a PSK cipher. This option must be provided in order to use a PSK cipher.
=item B<-psk_session> I<file> =item B<-psk_session> I<file>
Use the pem encoded SSL_SESSION data stored in B<file> as the basis of a PSK. Use the pem encoded SSL_SESSION data stored in I<file> as the basis of a PSK.
Note that this will only work if TLSv1.3 is negotiated. Note that this will only work if TLSv1.3 is negotiated.
=item B<-ssl3>, B<-tls1>, B<-tls1_1>, B<-tls1_2>, B<-tls1_3>, B<-no_ssl3>, B<-no_tls1>, B<-no_tls1_1>, B<-no_tls1_2>, B<-no_tls1_3> =item B<-ssl3>, B<-tls1>, B<-tls1_1>, B<-tls1_2>, B<-tls1_3>, B<-no_ssl3>, B<-no_tls1>, B<-no_tls1_1>, B<-no_tls1_2>, B<-no_tls1_3>
...@@ -622,7 +622,7 @@ colon (":") separated list of TLSv1.3 ciphersuite names. ...@@ -622,7 +622,7 @@ colon (":") separated list of TLSv1.3 ciphersuite names.
=item B<-starttls> I<protocol> =item B<-starttls> I<protocol>
Send the protocol-specific message(s) to switch to TLS for communication. Send the protocol-specific message(s) to switch to TLS for communication.
B<protocol> is a keyword for the intended protocol. Currently, the only I<protocol> is a keyword for the intended protocol. Currently, the only
supported keywords are "smtp", "pop3", "imap", "ftp", "xmpp", "xmpp-server", supported keywords are "smtp", "pop3", "imap", "ftp", "xmpp", "xmpp-server",
"irc", "postgres", "mysql", "lmtp", "nntp", "sieve" and "ldap". "irc", "postgres", "mysql", "lmtp", "nntp", "sieve" and "ldap".
...@@ -659,16 +659,16 @@ Disable RFC4507bis session ticket support. ...@@ -659,16 +659,16 @@ Disable RFC4507bis session ticket support.
=item B<-sess_out> I<filename> =item B<-sess_out> I<filename>
Output SSL session to B<filename>. Output SSL session to I<filename>.
=item B<-sess_in> I<sess.pem> =item B<-sess_in> I<filename>
Load SSL session from B<filename>. The client will attempt to resume a Load SSL session from I<filename>. The client will attempt to resume a
connection from this session. connection from this session.
=item B<-engine> I<id> =item B<-engine> I<id>
Specifying an engine (by its unique B<id> string) will cause B<s_client> Specifying an engine (by its unique I<id> string) will cause B<s_client>
to attempt to obtain a functional reference to the specified engine, to attempt to obtain a functional reference to the specified engine,
thus initialising it if needed. The engine will then be set as the default thus initialising it if needed. The engine will then be set as the default
for all available algorithms. for all available algorithms.
...@@ -702,7 +702,7 @@ response (if any) is printed out. ...@@ -702,7 +702,7 @@ response (if any) is printed out.
These flags enable the Enable the Application-Layer Protocol Negotiation These flags enable the Enable the Application-Layer Protocol Negotiation
or Next Protocol Negotiation (NPN) extension, respectively. ALPN is the or Next Protocol Negotiation (NPN) extension, respectively. ALPN is the
IETF standard and replaces NPN. IETF standard and replaces NPN.
The B<protocols> list is a comma-separated list of protocol names that The I<protocols> list is a comma-separated list of protocol names that
the client should advertise support for. The list should contain the most the client should advertise support for. The list should contain the most
desirable protocols first. Protocol names are printable ASCII strings, desirable protocols first. Protocol names are printable ASCII strings,
for example "http/1.1" or "spdy/3". for example "http/1.1" or "spdy/3".
......
...@@ -274,7 +274,7 @@ provided to the client. ...@@ -274,7 +274,7 @@ provided to the client.
=item B<-nameopt> I<val> =item B<-nameopt> I<val>
Option which determines how the subject or issuer names are displayed. The Option which determines how the subject or issuer names are displayed. The
B<val> argument can be a single option or multiple options separated by I<val> argument can be a single option or multiple options separated by
commas. Alternatively the B<-nameopt> switch may be used more than once to commas. Alternatively the B<-nameopt> switch may be used more than once to
set multiple options. See the L<x509(1)> manual page for details. set multiple options. See the L<x509(1)> manual page for details.
...@@ -441,7 +441,7 @@ used in conjunction with B<-early_data>. ...@@ -441,7 +441,7 @@ used in conjunction with B<-early_data>.
=item B<-id_prefix> I<val> =item B<-id_prefix> I<val>
Generate SSL/TLS session IDs prefixed by B<val>. This is mostly useful Generate SSL/TLS session IDs prefixed by I<val>. This is mostly useful
for testing any SSL/TLS code (eg. proxies) that wish to deal with multiple for testing any SSL/TLS code (eg. proxies) that wish to deal with multiple
servers, when each of which might be generating a unique range of session servers, when each of which might be generating a unique range of session
IDs (eg. with a certain prefix). IDs (eg. with a certain prefix).
...@@ -475,7 +475,7 @@ a verbose printout of the OCSP response. ...@@ -475,7 +475,7 @@ a verbose printout of the OCSP response.
=item B<-status_timeout> I<int> =item B<-status_timeout> I<int>
Sets the timeout for OCSP response to B<int> seconds. Sets the timeout for OCSP response to I<int> seconds.
=item B<-status_url> I<val> =item B<-status_url> I<val>
...@@ -652,24 +652,24 @@ Turns on non blocking I/O. ...@@ -652,24 +652,24 @@ Turns on non blocking I/O.
=item B<-psk_identity> I<val> =item B<-psk_identity> I<val>
Expect the client to send PSK identity B<val> when using a PSK Expect the client to send PSK identity I<val> when using a PSK
cipher suite, and warn if they do not. By default, the expected PSK cipher suite, and warn if they do not. By default, the expected PSK
identity is the string "Client_identity". identity is the string "Client_identity".
=item B<-psk_hint> I<val> =item B<-psk_hint> I<val>
Use the PSK identity hint B<val> when using a PSK cipher suite. Use the PSK identity hint I<val> when using a PSK cipher suite.
=item B<-psk> I<val> =item B<-psk> I<val>
Use the PSK key B<val> when using a PSK cipher suite. The key is Use the PSK key I<val> when using a PSK cipher suite. The key is
given as a hexadecimal number without leading 0x, for example -psk given as a hexadecimal number without leading 0x, for example -psk
1a2b3c4d. 1a2b3c4d.
This option must be provided in order to use a PSK cipher. This option must be provided in order to use a PSK cipher.
=item B<-psk_session> I<file> =item B<-psk_session> I<file>
Use the pem encoded SSL_SESSION data stored in B<file> as the basis of a PSK. Use the pem encoded SSL_SESSION data stored in I<file> as the basis of a PSK.
Note that this will only work if TLSv1.3 is negotiated. Note that this will only work if TLSv1.3 is negotiated.
=item B<-listen> =item B<-listen>
...@@ -713,7 +713,7 @@ disabling the ephemeral DH cipher suites. ...@@ -713,7 +713,7 @@ disabling the ephemeral DH cipher suites.
These flags enable the Enable the Application-Layer Protocol Negotiation These flags enable the Enable the Application-Layer Protocol Negotiation
or Next Protocol Negotiation (NPN) extension, respectively. ALPN is the or Next Protocol Negotiation (NPN) extension, respectively. ALPN is the
IETF standard and replaces NPN. IETF standard and replaces NPN.
The B<val> list is a comma-separated list of supported protocol The I<val> list is a comma-separated list of supported protocol
names. The list should contain the most desirable protocols first. names. The list should contain the most desirable protocols first.
Protocol names are printable ASCII strings, for example "http/1.1" or Protocol names are printable ASCII strings, for example "http/1.1" or
"spdy/3". "spdy/3".
...@@ -721,7 +721,7 @@ The flag B<-nextprotoneg> cannot be specified if B<-tls1_3> is used. ...@@ -721,7 +721,7 @@ The flag B<-nextprotoneg> cannot be specified if B<-tls1_3> is used.
=item B<-engine> I<val> =item B<-engine> I<val>
Specifying an engine (by its unique id string in B<val>) will cause B<s_server> Specifying an engine (by its unique id string in I<val>) will cause B<s_server>
to attempt to obtain a functional reference to the specified engine, to attempt to obtain a functional reference to the specified engine,
thus initialising it if needed. The engine will then be set as the default thus initialising it if needed. The engine will then be set as the default
for all available algorithms. for all available algorithms.
......
...@@ -8,7 +8,7 @@ openssl-s_time - SSL/TLS performance timing program ...@@ -8,7 +8,7 @@ openssl-s_time - SSL/TLS performance timing program
B<openssl> B<s_time> B<openssl> B<s_time>
[B<-help>] [B<-help>]
[B<-connect> I<host:port>] [B<-connect> I<host>:I<port>]
[B<-www> I<page>] [B<-www> I<page>]
[B<-cert> I<filename>] [B<-cert> I<filename>]
[B<-key> I<filename>] [B<-key> I<filename>]
...@@ -48,7 +48,7 @@ transferred (if any), and calculates the average time spent for one connection. ...@@ -48,7 +48,7 @@ transferred (if any), and calculates the average time spent for one connection.
Print out a usage message. Print out a usage message.
=item B<-connect> I<host:port> =item B<-connect> I<host>:I<port>
This specifies the host and optional port to connect to. This specifies the host and optional port to connect to.
...@@ -80,7 +80,7 @@ will never fail due to a server certificate verify failure. ...@@ -80,7 +80,7 @@ will never fail due to a server certificate verify failure.
=item B<-nameopt> I<option> =item B<-nameopt> I<option>
Option which determines how the subject or issuer names are displayed. The Option which determines how the subject or issuer names are displayed. The
B<option> argument can be a single option or multiple options separated by I<option> argument can be a single option or multiple options separated by
commas. Alternatively the B<-nameopt> switch may be used more than once to commas. Alternatively the B<-nameopt> switch may be used more than once to
set multiple options. See the L<x509(1)> manual page for details. set multiple options. See the L<x509(1)> manual page for details.
...@@ -161,7 +161,7 @@ To connect to an SSL HTTP server and get the default page the command ...@@ -161,7 +161,7 @@ To connect to an SSL HTTP server and get the default page the command
openssl s_time -connect servername:443 -www / -CApath yourdir -CAfile yourfile.pem -cipher commoncipher [-ssl3] openssl s_time -connect servername:443 -www / -CApath yourdir -CAfile yourfile.pem -cipher commoncipher [-ssl3]
would typically be used (https uses port 443). 'commoncipher' is a cipher to would typically be used (https uses port 443). I<commoncipher> is a cipher to
which both client and server can agree, see the L<ciphers(1)> command which both client and server can agree, see the L<ciphers(1)> command
for details. for details.
......
...@@ -9,7 +9,7 @@ openssl-sess_id - SSL/TLS session handling utility ...@@ -9,7 +9,7 @@ openssl-sess_id - SSL/TLS session handling utility
B<openssl> B<sess_id> B<openssl> B<sess_id>
[B<-help>] [B<-help>]
[B<-inform> B<DER>|B<PEM>] [B<-inform> B<DER>|B<PEM>]
[B<-outform> B<DER>|B<PEM>|B<MSS>] [B<-outform> B<DER>|B<PEM>|B<NSS>]
[B<-in> I<filename>] [B<-in> I<filename>]
[B<-out> I<filename>] [B<-out> I<filename>]
[B<-text>] [B<-text>]
...@@ -41,9 +41,9 @@ format base64 encoded with additional header and footer lines. ...@@ -41,9 +41,9 @@ format base64 encoded with additional header and footer lines.
=item B<-outform> B<DER>|B<PEM>|B<NSS> =item B<-outform> B<DER>|B<PEM>|B<NSS>
This specifies the output format. The B<PEM> and B<DER> options have the same meaning This specifies the output format. The B<PEM> and B<DER> options have the same
and default as the B<-inform> option. The B<NSS> option outputs the session id and meaning and default as the B<-inform> option. The B<NSS> option outputs the
the master key in NSS keylog format. session id and the master key in NSS keylog format.
=item B<-in> I<filename> =item B<-in> I<filename>
......
...@@ -295,7 +295,7 @@ specified, the argument is given to the engine as a key identifier. ...@@ -295,7 +295,7 @@ specified, the argument is given to the engine as a key identifier.
=item B<-passin> I<arg> =item B<-passin> I<arg>
The private key password source. For more information about the format of B<arg> The private key password source. For more information about the format of I<arg>
see L<openssl(1)/Pass phrase options>. see L<openssl(1)/Pass phrase options>.
=item B<-rand> I<files> =item B<-rand> I<files>
......
...@@ -28,7 +28,7 @@ B<openssl speed> ...@@ -28,7 +28,7 @@ B<openssl speed>
This command is used to test the performance of cryptographic algorithms. This command is used to test the performance of cryptographic algorithms.
To see the list of supported algorithms, use the I<list --digest-commands> To see the list of supported algorithms, use the I<list --digest-commands>
or I<list --cipher-commands> command. The global CSPRNG is denoted by or I<list --cipher-commands> command. The global CSPRNG is denoted by
the I<rand> algorithm name. the B<rand> algorithm name.
=head1 OPTIONS =head1 OPTIONS
...@@ -40,7 +40,7 @@ Print out a usage message. ...@@ -40,7 +40,7 @@ Print out a usage message.
=item B<-engine> I<id> =item B<-engine> I<id>
Specifying an engine (by its unique B<id> string) will cause B<speed> Specifying an engine (by its unique I<id> string) will cause B<speed>
to attempt to obtain a functional reference to the specified engine, to attempt to obtain a functional reference to the specified engine,
thus initialising it if needed. The engine will then be set as the default thus initialising it if needed. The engine will then be set as the default
for all available algorithms. for all available algorithms.
...@@ -54,8 +54,8 @@ of hardware engines. ...@@ -54,8 +54,8 @@ of hardware engines.
=item B<-evp> I<algo> =item B<-evp> I<algo>
Use the specified cipher or message digest algorithm via the EVP interface. Use the specified cipher or message digest algorithm via the EVP interface.
If B<algo> is an AEAD cipher, then you can pass <-aead> to benchmark a If I<algo> is an AEAD cipher, then you can pass B<-aead> to benchmark a
TLS-like sequence. And if B<algo> is a multi-buffer capable cipher, e.g. TLS-like sequence. And if I<algo> is a multi-buffer capable cipher, e.g.
aes-128-cbc-hmac-sha1, then B<-mb> will time multi-buffer operation. aes-128-cbc-hmac-sha1, then B<-mb> will time multi-buffer operation.
=item B<-hmac> I<digest> =item B<-hmac> I<digest>
...@@ -84,16 +84,16 @@ This can be used with a subsequent B<-rand> flag. ...@@ -84,16 +84,16 @@ This can be used with a subsequent B<-rand> flag.
=item B<-primes> I<num> =item B<-primes> I<num>
Generate a B<num>-prime RSA key and use it to run the benchmarks. This option Generate a I<num>-prime RSA key and use it to run the benchmarks. This option
is only effective if RSA algorithm is specified to test. is only effective if RSA algorithm is specified to test.
=item B<-seconds> I<num> =item B<-seconds> I<num>
Run benchmarks for B<num> seconds. Run benchmarks for I<num> seconds.
=item B<-bytes> I<num> =item B<-bytes> I<num>
Run benchmarks on B<num>-byte buffers. Affects ciphers, digests and the CSPRNG. Run benchmarks on I<num>-byte buffers. Affects ciphers, digests and the CSPRNG.
=item I<algorithm> ... =item I<algorithm> ...
......
...@@ -49,7 +49,7 @@ default. ...@@ -49,7 +49,7 @@ default.
=item B<-key> I<keyfile> =item B<-key> I<keyfile>
Create an SPKAC file using the private key in B<keyfile>. The Create an SPKAC file using the private key in I<keyfile>. The
B<-in>, B<-noout>, B<-spksect> and B<-verify> options are ignored if B<-in>, B<-noout>, B<-spksect> and B<-verify> options are ignored if
present. present.
...@@ -58,9 +58,9 @@ present. ...@@ -58,9 +58,9 @@ present.
Whether the key format is PEM, DER, or an engine-backed key. Whether the key format is PEM, DER, or an engine-backed key.
The default is PEM. The default is PEM.
=item B<-passin> I<password> =item B<-passin> I<arg>
The input file password source. For more information about the format of B<arg> The input file password source. For more information about the format of I<arg>
see L<openssl(1)/Pass phrase options>. see L<openssl(1)/Pass phrase options>.
=item B<-challenge> I<string> =item B<-challenge> I<string>
...@@ -94,7 +94,7 @@ Verifies the digital signature on the supplied SPKAC. ...@@ -94,7 +94,7 @@ Verifies the digital signature on the supplied SPKAC.
=item B<-engine> I<id> =item B<-engine> I<id>
Specifying an engine (by its unique B<id> string) will cause B<spkac> Specifying an engine (by its unique I<id> string) will cause B<spkac>
to attempt to obtain a functional reference to the specified engine, to attempt to obtain a functional reference to the specified engine,
thus initialising it if needed. The engine will then be set as the default thus initialising it if needed. The engine will then be set as the default
for all available algorithms. for all available algorithms.
......
...@@ -32,7 +32,7 @@ At most one of the B<-add>, B<-modify>, B<-delete>, and B<-list> options ...@@ -32,7 +32,7 @@ At most one of the B<-add>, B<-modify>, B<-delete>, and B<-list> options
can be specified. can be specified.
These options take zero or more usernames as parameters and perform the These options take zero or more usernames as parameters and perform the
appropriate operation on the SRP file. appropriate operation on the SRP file.
For B<-list>, if no B<user> is given then all users are displayed. For B<-list>, if no I<user> is given then all users are displayed.
The configuration file to use, and the section within the file, can be The configuration file to use, and the section within the file, can be
specified with the B<-config> and B<-name> flags, respectively. specified with the B<-config> and B<-name> flags, respectively.
...@@ -42,7 +42,7 @@ just specify the file to operate on. ...@@ -42,7 +42,7 @@ just specify the file to operate on.
The B<-userinfo> option specifies additional information to add when The B<-userinfo> option specifies additional information to add when
adding or modifying a user. adding or modifying a user.
The B<-gn> flag specifies the B<g> and B<N> values, using one of The B<-gn> flag specifies the I<g> and I<N> values, using one of
the strengths defined in IETF RFC 5054. the strengths defined in IETF RFC 5054.
The B<-passin> and B<-passout> arguments are parsed as described in The B<-passin> and B<-passout> arguments are parsed as described in
......
...@@ -49,7 +49,7 @@ this option prevents output of the PEM data. ...@@ -49,7 +49,7 @@ this option prevents output of the PEM data.
=item B<-passin> I<arg> =item B<-passin> I<arg>
the key password source. For more information about the format of B<arg> the key password source. For more information about the format of I<arg>
see L<openssl(1)/Pass phrase options>. see L<openssl(1)/Pass phrase options>.
=item B<-text> =item B<-text>
...@@ -59,7 +59,7 @@ B<openssl x509>, B<openssl pkey>, etc. ...@@ -59,7 +59,7 @@ B<openssl x509>, B<openssl pkey>, etc.
=item B<-engine> I<id> =item B<-engine> I<id>
specifying an engine (by its unique B<id> string) will cause B<storeutl> specifying an engine (by its unique I<id> string) will cause B<storeutl>
to attempt to obtain a functional reference to the specified engine, to attempt to obtain a functional reference to the specified engine,
thus initialising it if needed. thus initialising it if needed.
The engine will then be set as the default for all available algorithms. The engine will then be set as the default for all available algorithms.
...@@ -80,7 +80,7 @@ returned. ...@@ -80,7 +80,7 @@ returned.
=item B<-subject> I<arg> =item B<-subject> I<arg>
Search for an object having the subject name B<arg>. Search for an object having the subject name I<arg>.
The arg must be formatted as I</type0=value0/type1=value1/type2=...>. The arg must be formatted as I</type0=value0/type1=value1/type2=...>.
Keyword characters may be escaped by \ (backslash), and whitespace is retained. Keyword characters may be escaped by \ (backslash), and whitespace is retained.
Empty values are permitted but are ignored for the search. That is, Empty values are permitted but are ignored for the search. That is,
......
...@@ -314,7 +314,7 @@ instead of DER. (Optional) ...@@ -314,7 +314,7 @@ instead of DER. (Optional)
=item B<-engine> I<id> =item B<-engine> I<id>
Specifying an engine (by its unique B<id> string) will cause B<ts> Specifying an engine (by its unique I<id> string) will cause B<ts>
to attempt to obtain a functional reference to the specified engine, to attempt to obtain a functional reference to the specified engine,
thus initialising it if needed. The engine will then be set as the default thus initialising it if needed. The engine will then be set as the default
for all available algorithms. Default is built-in. (Optional) for all available algorithms. Default is built-in. (Optional)
......
...@@ -52,7 +52,7 @@ B<openssl> B<verify> ...@@ -52,7 +52,7 @@ B<openssl> B<verify>
[B<-sm2-id> I<string>] [B<-sm2-id> I<string>]
[B<-sm2-hex-id> I<hex-string>] [B<-sm2-hex-id> I<hex-string>]
[B<-->] [B<-->]
[certificates] [I<certificate> ...]
=for comment ifdef engine sm2-id sm2-hex-id =for comment ifdef engine sm2-id sm2-hex-id
...@@ -70,14 +70,14 @@ Print out a usage message. ...@@ -70,14 +70,14 @@ Print out a usage message.
=item B<-CAfile> I<file> =item B<-CAfile> I<file>
A B<file> of trusted certificates. A I<file> of trusted certificates.
The file should contain one or more certificates in PEM format. The file should contain one or more certificates in PEM format.
=item B<-CApath> I<directory> =item B<-CApath> I<directory>
A directory of trusted certificates. The certificates should have names A directory of trusted certificates. The certificates should have names
of the form: hash.0 or have symbolic links to them of this of the form: F<I<hash>.0> or have symbolic links to them of this
form ("hash" is the hashed certificate subject name: see the B<-hash> option form (I<hash> is the hashed certificate subject name: see the B<-hash> option
of the B<x509> utility). Under Unix the B<c_rehash> script will automatically of the B<x509> utility). Under Unix the B<c_rehash> script will automatically
create symbolic links to a directory of certificates. create symbolic links to a directory of certificates.
...@@ -95,8 +95,8 @@ Allow the verification of proxy certificates. ...@@ -95,8 +95,8 @@ Allow the verification of proxy certificates.
=item B<-attime> I<timestamp> =item B<-attime> I<timestamp>
Perform validation checks using time specified by B<timestamp> and not Perform validation checks using time specified by I<timestamp> and not
current system time. B<timestamp> is the number of seconds since current system time. I<timestamp> is the number of seconds since
01.01.1970 (UNIX time). 01.01.1970 (UNIX time).
=item B<-check_ss_sig> =item B<-check_ss_sig>
...@@ -106,9 +106,9 @@ because it doesn't add any security. ...@@ -106,9 +106,9 @@ because it doesn't add any security.
=item B<-CRLfile> I<file> =item B<-CRLfile> I<file>
The B<file> should contain one or more CRLs in PEM format. The I<file> should contain one or more CRLs in PEM format.
This option can be specified more than once to include CRLs from multiple This option can be specified more than once to include CRLs from multiple
B<files>. I<file>s.
=item B<-crl_download> =item B<-crl_download>
...@@ -126,7 +126,7 @@ to look up valid CRLs. ...@@ -126,7 +126,7 @@ to look up valid CRLs.
=item B<-engine> I<id> =item B<-engine> I<id>
Specifying an engine B<id> will cause L<verify(1)> to attempt to load the Specifying an engine I<id> will cause L<verify(1)> to attempt to load the
specified engine. specified engine.
The engine will then be set as the default for all its supported algorithms. The engine will then be set as the default for all its supported algorithms.
If you want to load certificates or CRLs that require engine support via any of If you want to load certificates or CRLs that require engine support via any of
...@@ -159,7 +159,7 @@ Set policy variable inhibit-policy-mapping (see RFC5280). ...@@ -159,7 +159,7 @@ Set policy variable inhibit-policy-mapping (see RFC5280).
=item B<-nameopt> I<option> =item B<-nameopt> I<option>
Option which determines how the subject or issuer names are displayed. The Option which determines how the subject or issuer names are displayed. The
B<option> argument can be a single option or multiple options separated by I<option> argument can be a single option or multiple options separated by
commas. Alternatively the B<-nameopt> switch may be used more than once to commas. Alternatively the B<-nameopt> switch may be used more than once to
set multiple options. See the L<x509(1)> manual page for details. set multiple options. See the L<x509(1)> manual page for details.
...@@ -177,8 +177,8 @@ trusted certificate that might not be self-signed. ...@@ -177,8 +177,8 @@ trusted certificate that might not be self-signed.
=item B<-policy> I<arg> =item B<-policy> I<arg>
Enable policy processing and add B<arg> to the user-initial-policy-set (see Enable policy processing and add I<arg> to the user-initial-policy-set (see
RFC5280). The policy B<arg> can be an object name an OID in numeric form. RFC5280). The policy I<arg> can be an object name an OID in numeric form.
This argument can appear more than once. This argument can appear more than once.
=item B<-policy_check> =item B<-policy_check>
...@@ -224,22 +224,22 @@ effect. ...@@ -224,22 +224,22 @@ effect.
=item B<-untrusted> I<file> =item B<-untrusted> I<file>
A B<file> of additional untrusted certificates (intermediate issuer CAs) used A I<file> of additional untrusted certificates (intermediate issuer CAs) used
to construct a certificate chain from the subject certificate to a trust-anchor. to construct a certificate chain from the subject certificate to a trust-anchor.
The B<file> should contain one or more certificates in PEM format. The I<file> should contain one or more certificates in PEM format.
This option can be specified more than once to include untrusted certificates This option can be specified more than once to include untrusted certificates
from multiple B<files>. from multiple I<file>s.
=item B<-trusted> I<file> =item B<-trusted> I<file>
A B<file> of trusted certificates, which must be self-signed, unless the A I<file> of trusted certificates, which must be self-signed, unless the
B<-partial_chain> option is specified. B<-partial_chain> option is specified.
The B<file> contains one or more certificates in PEM format. The I<file> contains one or more certificates in PEM format.
With this option, no additional (e.g., default) certificate lists are With this option, no additional (e.g., default) certificate lists are
consulted. consulted.
That is, the only trust-anchors are those listed in B<file>. That is, the only trust-anchors are those listed in I<file>.
This option can be specified more than once to include trusted certificates This option can be specified more than once to include trusted certificates
from multiple B<files>. from multiple I<file>s.
This option implies the B<-no-CAfile> and B<-no-CApath> options. This option implies the B<-no-CAfile> and B<-no-CApath> options.
This option cannot be used in combination with either of the B<-CAfile> or This option cannot be used in combination with either of the B<-CAfile> or
B<-CApath> options. B<-CApath> options.
...@@ -254,11 +254,11 @@ Print extra information about the operations being performed. ...@@ -254,11 +254,11 @@ Print extra information about the operations being performed.
=item B<-auth_level> I<level> =item B<-auth_level> I<level>
Set the certificate chain authentication security level to B<level>. Set the certificate chain authentication security level to I<level>.
The authentication security level determines the acceptable signature and The authentication security level determines the acceptable signature and
public key strength when verifying certificate chains. public key strength when verifying certificate chains.
For a certificate chain to validate, the public keys of all the certificates For a certificate chain to validate, the public keys of all the certificates
must meet the specified security B<level>. must meet the specified security I<level>.
The signature algorithm security level is enforced for all the certificates in The signature algorithm security level is enforced for all the certificates in
the chain except for the chain's I<trust anchor>, which is either directly the chain except for the chain's I<trust anchor>, which is either directly
trusted or validated by means other than its signature. trusted or validated by means other than its signature.
...@@ -272,30 +272,30 @@ shorter than 1024 bits. ...@@ -272,30 +272,30 @@ shorter than 1024 bits.
=item B<-verify_depth> I<num> =item B<-verify_depth> I<num>
Limit the certificate chain to B<num> intermediate CA certificates. Limit the certificate chain to I<num> intermediate CA certificates.
A maximal depth chain can have up to B<num+2> certificates, since neither the A maximal depth chain can have up to I<num>+2 certificates, since neither the
end-entity certificate nor the trust-anchor certificate count against the end-entity certificate nor the trust-anchor certificate count against the
B<-verify_depth> limit. B<-verify_depth> limit.
=item B<-verify_email> I<email> =item B<-verify_email> I<email>
Verify if the B<email> matches the email address in Subject Alternative Name or Verify if I<email> matches the email address in Subject Alternative Name or
the email in the subject Distinguished Name. the email in the subject Distinguished Name.
=item B<-verify_hostname> I<hostname> =item B<-verify_hostname> I<hostname>
Verify if the B<hostname> matches DNS name in Subject Alternative Name or Verify if I<hostname> matches DNS name in Subject Alternative Name or
Common Name in the subject certificate. Common Name in the subject certificate.
=item B<-verify_ip> I<ip> =item B<-verify_ip> I<ip>
Verify if the B<ip> matches the IP address in Subject Alternative Name of Verify if I<ip> matches the IP address in Subject Alternative Name of
the subject certificate. the subject certificate.
=item B<-verify_name> I<name> =item B<-verify_name> I<name>
Use default verification policies like trust model and required certificate Use default verification policies like trust model and required certificate
policies identified by B<name>. policies identified by I<name>.
The trust model determines which auxiliary trust or reject OIDs are applicable The trust model determines which auxiliary trust or reject OIDs are applicable
to verifying the given certificate chain. to verifying the given certificate chain.
See the B<-addtrust> and B<-addreject> options of the L<x509(1)> command-line See the B<-addtrust> and B<-addreject> options of the L<x509(1)> command-line
...@@ -335,7 +335,7 @@ Indicates the last option. All arguments following this are assumed to be ...@@ -335,7 +335,7 @@ Indicates the last option. All arguments following this are assumed to be
certificate files. This is useful if the first certificate filename begins certificate files. This is useful if the first certificate filename begins
with a B<->. with a B<->.
=item B<certificates> =item I<certificate> ...
One or more certificates to verify. If no certificates are given, B<verify> One or more certificates to verify. If no certificates are given, B<verify>
will attempt to read a certificate from standard input. Certificates must be will attempt to read a certificate from standard input. Certificates must be
......
...@@ -136,7 +136,7 @@ This can be used with a subsequent B<-rand> flag. ...@@ -136,7 +136,7 @@ This can be used with a subsequent B<-rand> flag.
=item B<-engine> I<id> =item B<-engine> I<id>
Specifying an engine (by its unique B<id> string) will cause B<x509> Specifying an engine (by its unique I<id> string) will cause B<x509>
to attempt to obtain a functional reference to the specified engine, to attempt to obtain a functional reference to the specified engine,
thus initialising it if needed. The engine will then be set as the default thus initialising it if needed. The engine will then be set as the default
for all available algorithms. for all available algorithms.
...@@ -170,7 +170,7 @@ See the L<x509v3_config(5)> manual page for the extension names. ...@@ -170,7 +170,7 @@ See the L<x509v3_config(5)> manual page for the extension names.
=item B<-certopt> I<option> =item B<-certopt> I<option>
Customise the output format used with B<-text>. The B<option> argument Customise the output format used with B<-text>. The I<option> argument
can be a single option or multiple options separated by commas. The can be a single option or multiple options separated by commas. The
B<-certopt> switch may be also be used more than once to set multiple B<-certopt> switch may be also be used more than once to set multiple
options. See the B<TEXT OPTIONS> section for more information. options. See the B<TEXT OPTIONS> section for more information.
...@@ -231,7 +231,7 @@ Outputs the issuer name. ...@@ -231,7 +231,7 @@ Outputs the issuer name.
=item B<-nameopt> I<option> =item B<-nameopt> I<option>
Option which determines how the subject or issuer names are displayed. The Option which determines how the subject or issuer names are displayed. The
B<option> argument can be a single option or multiple options separated by I<option> argument can be a single option or multiple options separated by
commas. Alternatively the B<-nameopt> switch may be used more than once to commas. Alternatively the B<-nameopt> switch may be used more than once to
set multiple options. See the B<NAME OPTIONS> section for more information. set multiple options. See the B<NAME OPTIONS> section for more information.
...@@ -257,7 +257,7 @@ Prints out the start and expiry dates of a certificate. ...@@ -257,7 +257,7 @@ Prints out the start and expiry dates of a certificate.
=item B<-checkend> I<arg> =item B<-checkend> I<arg>
Checks if the certificate expires within the next B<arg> seconds and exits Checks if the certificate expires within the next I<arg> seconds and exits
nonzero if yes it will expire or zero if not. nonzero if yes it will expire or zero if not.
=item B<-fingerprint> =item B<-fingerprint>
...@@ -372,7 +372,7 @@ Names and values of these options are algorithm-specific. ...@@ -372,7 +372,7 @@ Names and values of these options are algorithm-specific.
=item B<-passin> I<arg> =item B<-passin> I<arg>
The key password source. For more information about the format of B<arg> The key password source. For more information about the format of I<arg>
see L<openssl(1)/Pass phrase options>. see L<openssl(1)/Pass phrase options>.
=item B<-clrext> =item B<-clrext>
...@@ -470,7 +470,7 @@ Instead, the B<-subj> and <-force_pubkey> options need to be given. ...@@ -470,7 +470,7 @@ Instead, the B<-subj> and <-force_pubkey> options need to be given.
=item B<-force_pubkey> I<filename> =item B<-force_pubkey> I<filename>
When a certificate is created set its public key to the key in B<filename> When a certificate is created set its public key to the key in I<filename>
instead of the key contained in the input or given with the B<-signkey> option. instead of the key contained in the input or given with the B<-signkey> option.
This option is useful for creating self-issued certificates that are not This option is useful for creating self-issued certificates that are not
...@@ -499,8 +499,8 @@ or certificate request. ...@@ -499,8 +499,8 @@ or certificate request.
=head2 Name Options =head2 Name Options
The B<nameopt> command line switch determines how the subject and issuer The B<-nameopt> command line switch determines how the subject and issuer
names are displayed. If no B<nameopt> switch is present the default "oneline" names are displayed. If no B<-nameopt> switch is present the default "oneline"
format is used which is compatible with previous versions of OpenSSL. format is used which is compatible with previous versions of OpenSSL.
Each option is described in detail below, all options can be preceded by Each option is described in detail below, all options can be preceded by
a B<-> to turn the option off. Only the first four will normally be used. a B<-> to turn the option off. Only the first four will normally be used.
......
...@@ -8,10 +8,10 @@ openssl - OpenSSL command line tool ...@@ -8,10 +8,10 @@ openssl - OpenSSL command line tool
B<openssl> B<openssl>
I<command> I<command>
[ I<command_opts> ] [ I<command_opts> ... ]
[ I<command_args> ] [ I<command_args> ... ]
B<openssl> B<list> [ B<standard-commands> | B<digest-commands> | B<cipher-commands> | B<cipher-algorithms> | B<digest-algorithms> | B<mac-algorithms> | B<public-key-algorithms>] B<openssl> B<list> [ B<-standard-commands> | B<-digest-commands> | B<-cipher-commands> | B<-cipher-algorithms> | B<-digest-algorithms> | B<-mac-algorithms> | B<-public-key-algorithms>]
B<openssl> B<no->I<XXX> [ I<arbitrary options> ] B<openssl> B<no->I<XXX> [ I<arbitrary options> ]
...@@ -52,18 +52,18 @@ B<openssl.cnf> in the default certificate storage area, whose value ...@@ -52,18 +52,18 @@ B<openssl.cnf> in the default certificate storage area, whose value
depends on the configuration flags specified when the OpenSSL depends on the configuration flags specified when the OpenSSL
was built. was built.
The list parameters B<standard-commands>, B<digest-commands>, The list options B<-standard-commands>, B<-digest-commands>,
and B<cipher-commands> output a list (one entry per line) of the names and B<-cipher-commands> output a list (one entry per line) of the names
of all standard commands, message digest commands, or cipher commands, of all standard commands, message digest commands, or cipher commands,
respectively, that are available in the present B<openssl> utility. respectively, that are available in the present B<openssl> utility.
The list parameters B<cipher-algorithms>, B<digest-algorithms>, The list parameters B<-cipher-algorithms>, B<-digest-algorithms>,
and B<mac-algorithms> list all cipher, message digest, and message and B<-mac-algorithms> list all cipher, message digest, and message
authentication code names, one entry per line. Aliases are listed as: authentication code names, one entry per line. Aliases are listed as:
from => to from => to
The list parameter B<public-key-algorithms> lists all supported public The list parameter B<-public-key-algorithms> lists all supported public
key algorithms. key algorithms.
The command B<no->I<XXX> tests whether a command of the The command B<no->I<XXX> tests whether a command of the
...@@ -514,29 +514,29 @@ L<passphrase-encoding(7)>. ...@@ -514,29 +514,29 @@ L<passphrase-encoding(7)>.
=over 4 =over 4
=item B<pass:password> =item B<pass:>I<password>
The actual password is B<password>. Since the password is visible The actual password is I<password>. Since the password is visible
to utilities (like 'ps' under Unix) this form should only be used to utilities (like 'ps' under Unix) this form should only be used
where security is not important. where security is not important.
=item B<env:var> =item B<env:>I<var>
Obtain the password from the environment variable B<var>. Since Obtain the password from the environment variable I<var>. Since
the environment of other processes is visible on certain platforms the environment of other processes is visible on certain platforms
(e.g. ps under certain Unix OSes) this option should be used with caution. (e.g. ps under certain Unix OSes) this option should be used with caution.
=item B<file:pathname> =item B<file:>I<pathname>
The first line of B<pathname> is the password. If the same B<pathname> The first line of I<pathname> is the password. If the same I<pathname>
argument is supplied to B<-passin> and B<-passout> arguments then the first argument is supplied to B<-passin> and B<-passout> arguments then the first
line will be used for the input password and the next line for the output line will be used for the input password and the next line for the output
password. B<pathname> need not refer to a regular file: it could for example password. I<pathname> need not refer to a regular file: it could for example
refer to a device or named pipe. refer to a device or named pipe.
=item B<fd:number> =item B<fd:>I<number>
Read the password from the file descriptor B<number>. This can be used to Read the password from the file descriptor I<number>. This can be used to
send the data via a pipe for example. send the data via a pipe for example.
=item B<stdin> =item B<stdin>
...@@ -671,7 +671,7 @@ L<x509v3_config(5)> ...@@ -671,7 +671,7 @@ L<x509v3_config(5)>
=head1 HISTORY =head1 HISTORY
The B<list->I<XXX>B<-algorithms> pseudo-commands were added in OpenSSL 1.0.0; The B<list> -I<XXX>B<-algorithms> options were added in OpenSSL 1.0.0;
For notes on the availability of other commands, see their individual For notes on the availability of other commands, see their individual
manual pages. manual pages.
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册