提交 112161bd 编写于 作者: D Dr. Stephen Henson

Update docs.

上级 5ba4bf35
...@@ -12,7 +12,7 @@ I<command> ...@@ -12,7 +12,7 @@ I<command>
[ I<command_opts> ] [ I<command_opts> ]
[ I<command_args> ] [ I<command_args> ]
B<openssl> [ B<list-standard-commands> | B<list-message-digest-commands> | B<list-cipher-commands> ] B<openssl> [ B<list-standard-commands> | B<list-message-digest-commands> | B<list-cipher-commands> | B<list-cipher-algorithms> | B<list-message-digest-algorithms> | B<list-public-key-algorithms]
B<openssl> B<no->I<XXX> [ I<arbitrary options> ] B<openssl> B<no->I<XXX> [ I<arbitrary options> ]
...@@ -45,6 +45,14 @@ and B<list-cipher-commands> output a list (one entry per line) of the names ...@@ -45,6 +45,14 @@ and B<list-cipher-commands> output a list (one entry per line) of the names
of all standard commands, message digest commands, or cipher commands, of all standard commands, message digest commands, or cipher commands,
respectively, that are available in the present B<openssl> utility. respectively, that are available in the present B<openssl> utility.
The pseudo-commands B<list-cipher-algorithms> and
B<list-message-digest-algorithms> list all cipher and message digest names, one entry per line. Aliases are listed as:
from => to
The pseudo-command B<list-public-key-algorithms> lists all supported public
key algorithms.
The pseudo-command B<no->I<XXX> tests whether a command of the The pseudo-command B<no->I<XXX> tests whether a command of the
specified name is available. If no command named I<XXX> exists, it specified name is available. If no command named I<XXX> exists, it
returns 0 (success) and prints B<no->I<XXX>; otherwise it returns 1 returns 0 (success) and prints B<no->I<XXX>; otherwise it returns 1
......
...@@ -63,25 +63,25 @@ by default. ...@@ -63,25 +63,25 @@ by default.
=item B<-out filename> =item B<-out filename>
The filename to write certificates and private keys to, standard output by default. The filename to write certificates and private keys to, standard output by
They are all written in PEM format. default. They are all written in PEM format.
=item B<-pass arg>, B<-passin arg> =item B<-pass arg>, B<-passin arg>
the PKCS#12 file (i.e. input file) password source. For more information about the the PKCS#12 file (i.e. input file) password source. For more information about
format of B<arg> see the B<PASS PHRASE ARGUMENTS> section in the format of B<arg> see the B<PASS PHRASE ARGUMENTS> section in
L<openssl(1)|openssl(1)>. L<openssl(1)|openssl(1)>.
=item B<-passout arg> =item B<-passout arg>
pass phrase source to encrypt any outputed private keys with. For more information pass phrase source to encrypt any outputed private keys with. For more
about the format of B<arg> see the B<PASS PHRASE ARGUMENTS> section in information about the format of B<arg> see the B<PASS PHRASE ARGUMENTS> section
L<openssl(1)|openssl(1)>. in L<openssl(1)|openssl(1)>.
=item B<-noout> =item B<-noout>
this option inhibits output of the keys and certificates to the output file version this option inhibits output of the keys and certificates to the output file
of the PKCS#12 file. version of the PKCS#12 file.
=item B<-clcerts> =item B<-clcerts>
...@@ -148,10 +148,10 @@ by default. ...@@ -148,10 +148,10 @@ by default.
=item B<-in filename> =item B<-in filename>
The filename to read certificates and private keys from, standard input by default. The filename to read certificates and private keys from, standard input by
They must all be in PEM format. The order doesn't matter but one private key and default. They must all be in PEM format. The order doesn't matter but one
its corresponding certificate should be present. If additional certificates are private key and its corresponding certificate should be present. If additional
present they will also be included in the PKCS#12 file. certificates are present they will also be included in the PKCS#12 file.
=item B<-inkey filename> =item B<-inkey filename>
...@@ -160,8 +160,8 @@ in the input file. ...@@ -160,8 +160,8 @@ in the input file.
=item B<-name friendlyname> =item B<-name friendlyname>
This specifies the "friendly name" for the certificate and private key. This name This specifies the "friendly name" for the certificate and private key. This
is typically displayed in list boxes by software importing the file. name is typically displayed in list boxes by software importing the file.
=item B<-certfile filename> =item B<-certfile filename>
...@@ -201,9 +201,11 @@ key is encrypted using triple DES and the certificate using 40 bit RC2. ...@@ -201,9 +201,11 @@ key is encrypted using triple DES and the certificate using 40 bit RC2.
=item B<-keypbe alg>, B<-certpbe alg> =item B<-keypbe alg>, B<-certpbe alg>
these options allow the algorithm used to encrypt the private key and these options allow the algorithm used to encrypt the private key and
certificates to be selected. Although any PKCS#5 v1.5 or PKCS#12 algorithms certificates to be selected. Any PKCS#5 v1.5 or PKCS#12 PBE algorithm name
can be selected it is advisable only to use PKCS#12 algorithms. See the list can be used (see B<NOTES> section for more information). If a a cipher name
in the B<NOTES> section for more information. (as output by the B<list-cipher-algorithms> command is specified then it
is used with PKCS#5 v2.0. For interoperability reasons it is advisable to only
use PKCS#12 algorithms.
=item B<-keyex|-keysig> =item B<-keyex|-keysig>
...@@ -216,6 +218,10 @@ S/MIME signing, authenticode (ActiveX control signing) and SSL client ...@@ -216,6 +218,10 @@ S/MIME signing, authenticode (ActiveX control signing) and SSL client
authentication, however due to a bug only MSIE 5.0 and later support authentication, however due to a bug only MSIE 5.0 and later support
the use of signing only keys for SSL client authentication. the use of signing only keys for SSL client authentication.
=item B<-macalg digest>
specify the MAC digest algorithm. If not included them SHA1 will be used.
=item B<-nomaciter>, B<-noiter> =item B<-nomaciter>, B<-noiter>
these options affect the iteration counts on the MAC and key algorithms. these options affect the iteration counts on the MAC and key algorithms.
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册