1999-11-10 10:52:17 +08:00
|
|
|
=pod
|
2019-10-31 11:35:08 +08:00
|
|
|
{- OpenSSL::safe::output_do_not_edit_headers(); -}
|
2019-10-13 05:45:56 +08:00
|
|
|
|
1999-11-10 10:52:17 +08:00
|
|
|
=head1 NAME
|
|
|
|
|
2020-02-19 00:52:12 +08:00
|
|
|
openssl-req - PKCS#10 certificate request and certificate generating command
|
1999-11-10 10:52:17 +08:00
|
|
|
|
|
|
|
=head1 SYNOPSIS
|
|
|
|
|
|
|
|
B<openssl> B<req>
|
2016-02-06 00:58:45 +08:00
|
|
|
[B<-help>]
|
2019-09-26 03:20:11 +08:00
|
|
|
[B<-inform> B<DER>|B<PEM>]
|
|
|
|
[B<-outform> B<DER>|B<PEM>]
|
|
|
|
[B<-in> I<filename>]
|
|
|
|
[B<-passin> I<arg>]
|
|
|
|
[B<-out> I<filename>]
|
|
|
|
[B<-passout> I<arg>]
|
1999-11-10 10:52:17 +08:00
|
|
|
[B<-text>]
|
2001-12-02 07:03:30 +08:00
|
|
|
[B<-pubkey>]
|
1999-11-10 10:52:17 +08:00
|
|
|
[B<-noout>]
|
|
|
|
[B<-verify>]
|
|
|
|
[B<-modulus>]
|
|
|
|
[B<-new>]
|
2019-10-02 00:16:29 +08:00
|
|
|
[B<-newkey> I<arg>]
|
Document most missing options
Add cmd-nits make target.
Listing options should stop when it hits the "parameters" separator.
Add missing .pod.in files to doc/man1/build.info
Tweak find-doc-nits to try openssl-XXX before XXX for POD files and
change an error messavge to be more useful.
Fix the following pages: ca, cms, crl, dgst, enc,
engine, errstr, gendsa, genrsa, list, ocsp, passwd, pkcs7, pkcs12, rand,
rehash, req, rsautil, s_server, speed, s_time,
sess_id, smime, srp, ts, x509.
Reviewed-by: Matt Caswell <matt@openssl.org>
Reviewed-by: Dmitry Belyavskiy <beldmit@gmail.com>
Reviewed-by: Matthias St. Pierre <Matthias.St.Pierre@ncp-e.com>
(Merged from https://github.com/openssl/openssl/pull/10873)
2020-01-17 02:40:52 +08:00
|
|
|
[B<-pkeyopt> I<opt>:I<value>]
|
2020-05-11 21:41:08 +08:00
|
|
|
[B<-noenc>]
|
1999-11-10 10:52:17 +08:00
|
|
|
[B<-nodes>]
|
2019-09-26 03:20:11 +08:00
|
|
|
[B<-key> I<filename>]
|
2020-05-06 19:51:50 +08:00
|
|
|
[B<-keyform> B<DER>|B<PEM>|B<P12>|B<ENGINE>]
|
2019-09-26 03:20:11 +08:00
|
|
|
[B<-keyout> I<filename>]
|
|
|
|
[B<-keygen_engine> I<id>]
|
2019-10-02 23:13:03 +08:00
|
|
|
[B<-I<digest>>]
|
2019-09-26 03:20:11 +08:00
|
|
|
[B<-config> I<filename>]
|
2020-03-05 03:41:53 +08:00
|
|
|
[B<-section> I<name>]
|
1999-11-10 10:52:17 +08:00
|
|
|
[B<-x509>]
|
2019-09-26 03:20:11 +08:00
|
|
|
[B<-days> I<n>]
|
|
|
|
[B<-set_serial> I<n>]
|
2000-02-18 08:54:21 +08:00
|
|
|
[B<-newhdr>]
|
2019-09-26 03:20:11 +08:00
|
|
|
[B<-addext> I<ext>]
|
|
|
|
[B<-extensions> I<section>]
|
|
|
|
[B<-reqexts> I<section>]
|
2016-03-11 04:32:16 +08:00
|
|
|
[B<-precert>]
|
2001-10-26 20:40:38 +08:00
|
|
|
[B<-utf8>]
|
2009-04-15 23:27:03 +08:00
|
|
|
[B<-reqopt>]
|
|
|
|
[B<-subject>]
|
2019-09-26 03:20:11 +08:00
|
|
|
[B<-subj> I<arg>]
|
2020-09-02 19:52:23 +08:00
|
|
|
[B<-multivalue-rdn>]
|
2019-09-26 03:20:11 +08:00
|
|
|
[B<-sigopt> I<nm>:I<v>]
|
2020-03-11 06:08:59 +08:00
|
|
|
[B<-vfyopt> I<nm>:I<v>]
|
2001-03-05 19:09:43 +08:00
|
|
|
[B<-batch>]
|
|
|
|
[B<-verbose>]
|
2019-10-25 11:02:09 +08:00
|
|
|
{- $OpenSSL::safe::opt_name_synopsis -}
|
2019-10-13 05:45:56 +08:00
|
|
|
{- $OpenSSL::safe::opt_r_synopsis -}
|
2019-10-13 05:45:56 +08:00
|
|
|
{- $OpenSSL::safe::opt_engine_synopsis -}
|
2020-02-25 12:29:30 +08:00
|
|
|
{- $OpenSSL::safe::opt_provider_synopsis -}
|
1999-11-10 10:52:17 +08:00
|
|
|
|
2020-03-11 06:08:59 +08:00
|
|
|
=for openssl ifdef engine keygen_engine
|
2019-09-23 07:49:25 +08:00
|
|
|
|
1999-11-10 10:52:17 +08:00
|
|
|
=head1 DESCRIPTION
|
|
|
|
|
Command docs: fix up command references
Almost all OpenSSL commands are in reality 'openssl cmd', so make sure
they are refered to like that and not just as the sub-command.
Self-references are avoided as much as is possible, and replaced with
"this command". In some cases, we even avoid that with a slight
rewrite of the sentence or paragrah they were in. However, in the few
cases where a self-reference is still admissible, they are done in
bold, i.e. openssl-speed.pod references itself like this:
B<openssl speed>
References to other commands are done as manual links, i.e. CA.pl.pod
references 'openssl req' like this: L<openssl-req(1)>
Some commands are examples rather than references; we enclose those in
C<>.
While we are it, we abolish "utility", replacing it with "command", or
remove it entirely in some cases.
Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
(Merged from https://github.com/openssl/openssl/pull/10065)
2019-10-02 01:43:36 +08:00
|
|
|
This command primarily creates and processes certificate requests
|
1999-11-10 10:52:17 +08:00
|
|
|
in PKCS#10 format. It can additionally create self signed certificates
|
|
|
|
for use as root CAs for example.
|
|
|
|
|
2016-12-13 00:14:40 +08:00
|
|
|
=head1 OPTIONS
|
1999-11-10 10:52:17 +08:00
|
|
|
|
|
|
|
=over 4
|
|
|
|
|
2016-02-06 00:58:45 +08:00
|
|
|
=item B<-help>
|
|
|
|
|
|
|
|
Print out a usage message.
|
|
|
|
|
2019-10-10 09:48:33 +08:00
|
|
|
=item B<-inform> B<DER>|B<PEM>, B<-outform> B<DER>|B<PEM>
|
1999-11-10 10:52:17 +08:00
|
|
|
|
2019-10-10 09:48:33 +08:00
|
|
|
The input and formats; the default is B<PEM>.
|
|
|
|
See L<openssl(1)/Format Options> for details.
|
1999-11-10 10:52:17 +08:00
|
|
|
|
2019-10-10 09:48:33 +08:00
|
|
|
The data is a PKCS#10 object.
|
1999-11-10 10:52:17 +08:00
|
|
|
|
2019-09-26 03:20:11 +08:00
|
|
|
=item B<-in> I<filename>
|
1999-11-10 10:52:17 +08:00
|
|
|
|
|
|
|
This specifies the input filename to read a request from or standard input
|
|
|
|
if this option is not specified. A request is only read if the creation
|
|
|
|
options (B<-new> and B<-newkey>) are not specified.
|
|
|
|
|
2019-09-26 03:20:11 +08:00
|
|
|
=item B<-sigopt> I<nm>:I<v>
|
2019-03-19 09:22:32 +08:00
|
|
|
|
2020-03-11 06:08:59 +08:00
|
|
|
Pass options to the signature algorithm during sign operations.
|
2019-03-19 09:22:32 +08:00
|
|
|
Names and values of these options are algorithm-specific.
|
|
|
|
|
2020-03-11 06:08:59 +08:00
|
|
|
=item B<-vfyopt> I<nm>:I<v>
|
|
|
|
|
|
|
|
Pass options to the signature algorithm during verify operations.
|
|
|
|
Names and values of these options are algorithm-specific.
|
|
|
|
|
|
|
|
=begin comment
|
|
|
|
|
|
|
|
Maybe it would be preferable to only have -opts instead of -sigopt and
|
|
|
|
-vfyopt? They are both present here to be compatible with L<openssl-ca(1)>,
|
|
|
|
which supports both options for good reasons.
|
|
|
|
|
|
|
|
=end comment
|
|
|
|
|
2019-10-09 01:10:04 +08:00
|
|
|
=item B<-passin> I<arg>, B<-passout> I<arg>
|
2000-01-02 00:42:49 +08:00
|
|
|
|
2019-10-09 01:10:04 +08:00
|
|
|
The password source for the input and output file.
|
|
|
|
For more information about the format of B<arg>
|
|
|
|
see L<openssl(1)/Pass Phrase Options>.
|
2000-01-02 00:42:49 +08:00
|
|
|
|
2019-09-26 03:20:11 +08:00
|
|
|
=item B<-out> I<filename>
|
1999-11-10 10:52:17 +08:00
|
|
|
|
|
|
|
This specifies the output filename to write to or standard output by
|
|
|
|
default.
|
|
|
|
|
|
|
|
=item B<-text>
|
|
|
|
|
2017-03-30 05:38:30 +08:00
|
|
|
Prints out the certificate request in text form.
|
1999-11-10 10:52:17 +08:00
|
|
|
|
2009-04-15 23:27:03 +08:00
|
|
|
=item B<-subject>
|
|
|
|
|
2017-03-30 05:38:30 +08:00
|
|
|
Prints out the request subject (or certificate subject if B<-x509> is
|
2009-04-15 23:27:03 +08:00
|
|
|
specified)
|
|
|
|
|
2001-12-02 07:03:30 +08:00
|
|
|
=item B<-pubkey>
|
|
|
|
|
2017-03-30 05:38:30 +08:00
|
|
|
Outputs the public key.
|
2001-12-02 07:03:30 +08:00
|
|
|
|
1999-11-10 10:52:17 +08:00
|
|
|
=item B<-noout>
|
|
|
|
|
2017-03-30 05:38:30 +08:00
|
|
|
This option prevents output of the encoded version of the request.
|
1999-11-10 10:52:17 +08:00
|
|
|
|
|
|
|
=item B<-modulus>
|
|
|
|
|
2017-03-30 05:38:30 +08:00
|
|
|
This option prints out the value of the modulus of the public key
|
1999-11-10 10:52:17 +08:00
|
|
|
contained in the request.
|
|
|
|
|
|
|
|
=item B<-verify>
|
|
|
|
|
2017-03-30 05:38:30 +08:00
|
|
|
Verifies the signature on the request.
|
1999-11-10 10:52:17 +08:00
|
|
|
|
|
|
|
=item B<-new>
|
|
|
|
|
2017-03-30 05:38:30 +08:00
|
|
|
This option generates a new certificate request. It will prompt
|
1999-11-10 10:52:17 +08:00
|
|
|
the user for the relevant field values. The actual fields
|
|
|
|
prompted for and their maximum and minimum sizes are specified
|
|
|
|
in the configuration file and any requested extensions.
|
|
|
|
|
|
|
|
If the B<-key> option is not used it will generate a new RSA private
|
|
|
|
key using information specified in the configuration file.
|
|
|
|
|
2019-09-26 03:20:11 +08:00
|
|
|
=item B<-newkey> I<arg>
|
1999-11-10 10:52:17 +08:00
|
|
|
|
2017-03-30 05:38:30 +08:00
|
|
|
This option creates a new certificate request and a new private
|
2019-10-02 00:16:29 +08:00
|
|
|
key. The argument takes one of several forms.
|
|
|
|
|
|
|
|
B<rsa:>I<nbits>, where
|
|
|
|
I<nbits> is the number of bits, generates an RSA key I<nbits>
|
|
|
|
in size. If I<nbits> is omitted, i.e. B<-newkey> I<rsa> specified,
|
2009-04-15 23:27:03 +08:00
|
|
|
the default key size, specified in the configuration file is used.
|
|
|
|
|
2019-10-02 00:16:29 +08:00
|
|
|
All other algorithms support the B<-newkey> I<alg>:I<file> form, where file
|
Command docs: fix up command references
Almost all OpenSSL commands are in reality 'openssl cmd', so make sure
they are refered to like that and not just as the sub-command.
Self-references are avoided as much as is possible, and replaced with
"this command". In some cases, we even avoid that with a slight
rewrite of the sentence or paragrah they were in. However, in the few
cases where a self-reference is still admissible, they are done in
bold, i.e. openssl-speed.pod references itself like this:
B<openssl speed>
References to other commands are done as manual links, i.e. CA.pl.pod
references 'openssl req' like this: L<openssl-req(1)>
Some commands are examples rather than references; we enclose those in
C<>.
While we are it, we abolish "utility", replacing it with "command", or
remove it entirely in some cases.
Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
(Merged from https://github.com/openssl/openssl/pull/10065)
2019-10-02 01:43:36 +08:00
|
|
|
may be an algorithm parameter file, created with C<openssl genpkey -genparam>
|
2019-10-02 00:16:29 +08:00
|
|
|
or an X.509 certificate for a key with appropriate algorithm.
|
2009-04-15 23:27:03 +08:00
|
|
|
|
2019-10-02 00:16:29 +08:00
|
|
|
B<param:>I<file> generates a key using the parameter file or certificate
|
|
|
|
I<file>, the algorithm is determined by the parameters. I<algname>:I<file>
|
|
|
|
use algorithm I<algname> and parameter file I<file>: the two algorithms must
|
|
|
|
match or an error occurs. I<algname> just uses algorithm I<algname>, and
|
|
|
|
parameters, if necessary should be specified via B<-pkeyopt> parameter.
|
2009-04-15 23:27:03 +08:00
|
|
|
|
2019-10-02 00:16:29 +08:00
|
|
|
B<dsa:>I<filename> generates a DSA key using the parameters
|
|
|
|
in the file I<filename>. B<ec:>I<filename> generates EC key (usable both with
|
|
|
|
ECDSA or ECDH algorithms), B<gost2001:>I<filename> generates GOST R
|
|
|
|
34.10-2001 key (requires B<gost> engine configured in the configuration
|
2009-04-15 23:27:03 +08:00
|
|
|
file). If just B<gost2001> is specified a parameter set should be
|
2019-09-26 03:20:11 +08:00
|
|
|
specified by B<-pkeyopt> I<paramset:X>
|
2009-04-15 23:27:03 +08:00
|
|
|
|
2019-10-02 00:16:29 +08:00
|
|
|
=item B<-pkeyopt> I<opt>:I<value>
|
2006-07-08 08:24:47 +08:00
|
|
|
|
2019-10-02 00:16:29 +08:00
|
|
|
Set the public key algorithm option I<opt> to I<value>. The precise set of
|
2006-07-08 08:24:47 +08:00
|
|
|
options supported depends on the public key algorithm used and its
|
2019-10-02 02:06:22 +08:00
|
|
|
implementation.
|
|
|
|
See L<openssl-genpkey(1)/KEY GENERATION OPTIONS> for more details.
|
1999-11-10 10:52:17 +08:00
|
|
|
|
2019-09-26 03:20:11 +08:00
|
|
|
=item B<-key> I<filename>
|
1999-11-10 10:52:17 +08:00
|
|
|
|
|
|
|
This specifies the file to read the private key from. It also
|
|
|
|
accepts PKCS#8 format private keys for PEM format files.
|
|
|
|
|
2020-05-06 19:51:50 +08:00
|
|
|
=item B<-keyform> B<DER>|B<PEM>|B<P12>|B<ENGINE>
|
1999-11-10 10:52:17 +08:00
|
|
|
|
2019-10-10 09:48:33 +08:00
|
|
|
The format of the private key; the default is B<PEM>.
|
2020-05-06 19:51:50 +08:00
|
|
|
The only value with effect is B<ENGINE>; all others have become obsolete.
|
2019-10-10 09:48:33 +08:00
|
|
|
See L<openssl(1)/Format Options> for details.
|
1999-11-10 10:52:17 +08:00
|
|
|
|
2019-09-26 03:20:11 +08:00
|
|
|
=item B<-keyout> I<filename>
|
1999-11-10 10:52:17 +08:00
|
|
|
|
2017-03-30 05:38:30 +08:00
|
|
|
This gives the filename to write the newly created private key to.
|
1999-11-10 10:52:17 +08:00
|
|
|
If this option is not specified then the filename present in the
|
|
|
|
configuration file is used.
|
|
|
|
|
2020-05-11 21:41:08 +08:00
|
|
|
=item B<-noenc>
|
1999-11-10 10:52:17 +08:00
|
|
|
|
2017-03-30 05:38:30 +08:00
|
|
|
If this option is specified then if a private key is created it
|
1999-11-10 10:52:17 +08:00
|
|
|
will not be encrypted.
|
|
|
|
|
2020-05-11 21:41:08 +08:00
|
|
|
=item B<-nodes>
|
|
|
|
|
|
|
|
This option is deprecated since OpenSSL 3.0; use B<-noenc> instead.
|
|
|
|
|
2019-10-02 23:13:03 +08:00
|
|
|
=item B<-I<digest>>
|
2009-04-15 23:27:03 +08:00
|
|
|
|
2017-03-30 05:38:30 +08:00
|
|
|
This specifies the message digest to sign the request.
|
2015-08-28 00:28:08 +08:00
|
|
|
Any digest supported by the OpenSSL B<dgst> command can be used.
|
|
|
|
This overrides the digest algorithm specified in
|
2009-04-15 23:27:03 +08:00
|
|
|
the configuration file.
|
1999-11-10 10:52:17 +08:00
|
|
|
|
2009-04-15 23:27:03 +08:00
|
|
|
Some public key algorithms may override this choice. For instance, DSA
|
|
|
|
signatures always use SHA1, GOST R 34.10 signatures always use
|
2018-08-09 23:01:20 +08:00
|
|
|
GOST R 34.11-94 (B<-md_gost94>), Ed25519 and Ed448 never use any digest.
|
1999-11-10 10:52:17 +08:00
|
|
|
|
2019-09-26 03:20:11 +08:00
|
|
|
=item B<-config> I<filename>
|
1999-11-10 10:52:17 +08:00
|
|
|
|
2017-03-30 05:38:30 +08:00
|
|
|
This allows an alternative configuration file to be specified.
|
2017-02-08 00:33:21 +08:00
|
|
|
Optional; for a description of the default value,
|
|
|
|
see L<openssl(1)/COMMAND SUMMARY>.
|
1999-11-10 10:52:17 +08:00
|
|
|
|
2020-03-05 03:41:53 +08:00
|
|
|
=item B<-section> I<name>
|
|
|
|
|
|
|
|
Specifies the name of the section to use; the default is B<req>.
|
|
|
|
|
2019-09-26 03:20:11 +08:00
|
|
|
=item B<-subj> I<arg>
|
2001-03-05 19:09:43 +08:00
|
|
|
|
2017-03-30 05:38:30 +08:00
|
|
|
Sets subject name for new request or supersedes the subject name
|
2001-03-05 19:09:43 +08:00
|
|
|
when processing a request.
|
2020-09-02 19:52:23 +08:00
|
|
|
|
2019-10-02 02:29:52 +08:00
|
|
|
The arg must be formatted as C</type0=value0/type1=value1/type2=...>.
|
2020-09-02 19:52:23 +08:00
|
|
|
Special characters may be escaped by C<\> (backslash), whitespace is retained.
|
2018-10-05 02:49:21 +08:00
|
|
|
Empty values are permitted, but the corresponding type will not be included
|
|
|
|
in the request.
|
2020-09-02 19:52:23 +08:00
|
|
|
Giving a single C</> will lead to an empty sequence of RDNs (a NULL-DN).
|
|
|
|
Multi-valued RDNs can be formed by placing a C<+> character instead of a C</>
|
|
|
|
between the AttributeValueAssertions (AVAs) that specify the members of the set.
|
|
|
|
Example:
|
2005-07-15 17:49:03 +08:00
|
|
|
|
2019-10-02 02:29:52 +08:00
|
|
|
C</DC=org/DC=OpenSSL/DC=users/UID=123456+CN=John Doe>
|
2005-07-15 17:49:03 +08:00
|
|
|
|
2020-09-02 19:52:23 +08:00
|
|
|
=item B<-multivalue-rdn>
|
|
|
|
|
|
|
|
This option has been deprecated and has no effect.
|
2005-07-15 17:49:03 +08:00
|
|
|
|
1999-11-10 10:52:17 +08:00
|
|
|
=item B<-x509>
|
|
|
|
|
2017-03-30 05:38:30 +08:00
|
|
|
This option outputs a self signed certificate instead of a certificate
|
1999-11-10 10:52:17 +08:00
|
|
|
request. This is typically used to generate a test certificate or
|
|
|
|
a self signed root CA. The extensions added to the certificate
|
2001-03-09 21:57:14 +08:00
|
|
|
(if any) are specified in the configuration file. Unless specified
|
2019-10-02 00:16:29 +08:00
|
|
|
using the B<-set_serial> option, a large random number will be used for
|
2014-09-01 06:22:09 +08:00
|
|
|
the serial number.
|
1999-11-10 10:52:17 +08:00
|
|
|
|
2017-05-11 20:25:17 +08:00
|
|
|
If existing request is specified with the B<-in> option, it is converted
|
|
|
|
to the self signed certificate otherwise new request is created.
|
|
|
|
|
2019-09-26 03:20:11 +08:00
|
|
|
=item B<-days> I<n>
|
1999-11-10 10:52:17 +08:00
|
|
|
|
2017-03-30 05:38:30 +08:00
|
|
|
When the B<-x509> option is being used this specifies the number of
|
2019-10-02 00:16:29 +08:00
|
|
|
days to certify the certificate for, otherwise it is ignored. I<n> should
|
2017-11-21 23:43:03 +08:00
|
|
|
be a positive integer. The default is 30 days.
|
1999-11-10 10:52:17 +08:00
|
|
|
|
2019-09-26 03:20:11 +08:00
|
|
|
=item B<-set_serial> I<n>
|
2001-03-09 21:57:14 +08:00
|
|
|
|
2017-03-30 05:38:30 +08:00
|
|
|
Serial number to use when outputting a self signed certificate. This
|
2019-10-02 02:29:52 +08:00
|
|
|
may be specified as a decimal value or a hex value if preceded by C<0x>.
|
2001-03-09 21:57:14 +08:00
|
|
|
|
2019-09-26 03:20:11 +08:00
|
|
|
=item B<-addext> I<ext>
|
2017-12-28 01:29:36 +08:00
|
|
|
|
|
|
|
Add a specific extension to the certificate (if the B<-x509> option is
|
|
|
|
present) or certificate request. The argument must have the form of
|
|
|
|
a key=value pair as it would appear in a config file.
|
|
|
|
|
|
|
|
This option can be given multiple times.
|
|
|
|
|
2019-09-26 03:20:11 +08:00
|
|
|
=item B<-extensions> I<section>
|
2000-05-30 16:01:24 +08:00
|
|
|
|
2019-09-26 03:20:11 +08:00
|
|
|
=item B<-reqexts> I<section>
|
1999-11-10 10:52:17 +08:00
|
|
|
|
2017-03-30 05:38:30 +08:00
|
|
|
These options specify alternative sections to include certificate
|
1999-11-10 10:52:17 +08:00
|
|
|
extensions (if the B<-x509> option is present) or certificate
|
|
|
|
request extensions. This allows several different sections to
|
|
|
|
be used in the same configuration file to specify requests for
|
|
|
|
a variety of purposes.
|
|
|
|
|
2016-03-11 04:32:16 +08:00
|
|
|
=item B<-precert>
|
|
|
|
|
2017-03-30 05:38:30 +08:00
|
|
|
A poison extension will be added to the certificate, making it a
|
2016-03-11 04:32:16 +08:00
|
|
|
"pre-certificate" (see RFC6962). This can be submitted to Certificate
|
|
|
|
Transparency logs in order to obtain signed certificate timestamps (SCTs).
|
|
|
|
These SCTs can then be embedded into the pre-certificate as an extension, before
|
|
|
|
removing the poison and signing the certificate.
|
|
|
|
|
2017-01-14 03:10:26 +08:00
|
|
|
This implies the B<-new> flag.
|
|
|
|
|
2001-10-26 20:40:38 +08:00
|
|
|
=item B<-utf8>
|
|
|
|
|
2017-03-30 05:38:30 +08:00
|
|
|
This option causes field values to be interpreted as UTF8 strings, by
|
2001-10-26 20:40:38 +08:00
|
|
|
default they are interpreted as ASCII. This means that the field
|
|
|
|
values, whether prompted from a terminal or obtained from a
|
|
|
|
configuration file, must be valid UTF8 strings.
|
|
|
|
|
2019-10-02 00:16:29 +08:00
|
|
|
=item B<-reqopt> I<option>
|
2009-04-15 23:27:03 +08:00
|
|
|
|
2019-10-02 00:16:29 +08:00
|
|
|
Customise the output format used with B<-text>. The I<option> argument can be
|
2016-05-20 20:11:46 +08:00
|
|
|
a single option or multiple options separated by commas.
|
2009-04-15 23:27:03 +08:00
|
|
|
|
2019-10-02 03:57:00 +08:00
|
|
|
See discussion of the B<-certopt> parameter in the L<openssl-x509(1)>
|
2009-04-15 23:27:03 +08:00
|
|
|
command.
|
|
|
|
|
2000-02-18 08:54:21 +08:00
|
|
|
=item B<-newhdr>
|
|
|
|
|
2013-12-24 02:28:30 +08:00
|
|
|
Adds the word B<NEW> to the PEM file header and footer lines on the outputted
|
2000-02-18 08:54:21 +08:00
|
|
|
request. Some software (Netscape certificate server) and some CAs need this.
|
|
|
|
|
2001-03-05 19:09:43 +08:00
|
|
|
=item B<-batch>
|
|
|
|
|
2017-03-30 05:38:30 +08:00
|
|
|
Non-interactive mode.
|
2001-03-05 19:09:43 +08:00
|
|
|
|
|
|
|
=item B<-verbose>
|
|
|
|
|
2017-03-30 05:38:30 +08:00
|
|
|
Print extra details about the operations being performed.
|
2001-03-05 19:09:43 +08:00
|
|
|
|
2019-09-26 03:20:11 +08:00
|
|
|
=item B<-keygen_engine> I<id>
|
2009-04-15 23:27:03 +08:00
|
|
|
|
2019-10-02 00:16:29 +08:00
|
|
|
Specifies an engine (by its unique I<id> string) which would be used
|
2009-04-15 23:27:03 +08:00
|
|
|
for key generation operations.
|
|
|
|
|
2019-10-25 11:02:09 +08:00
|
|
|
{- $OpenSSL::safe::opt_name_item -}
|
|
|
|
|
2019-10-13 05:45:56 +08:00
|
|
|
{- $OpenSSL::safe::opt_r_item -}
|
|
|
|
|
2019-10-13 05:45:56 +08:00
|
|
|
{- $OpenSSL::safe::opt_engine_item -}
|
|
|
|
|
2020-02-25 12:29:30 +08:00
|
|
|
{- $OpenSSL::safe::opt_provider_item -}
|
|
|
|
|
1999-11-10 10:52:17 +08:00
|
|
|
=back
|
|
|
|
|
|
|
|
=head1 CONFIGURATION FILE FORMAT
|
|
|
|
|
2000-01-07 09:39:59 +08:00
|
|
|
The configuration options are specified in the B<req> section of
|
2020-03-05 03:41:53 +08:00
|
|
|
the configuration file. An alternate name be specified by using the
|
|
|
|
B<-section> option.
|
|
|
|
As with all configuration files, if no
|
|
|
|
value is specified in the specific section then
|
1999-11-10 10:52:17 +08:00
|
|
|
the initial unnamed or B<default> section is searched too.
|
|
|
|
|
|
|
|
The options available are described in detail below.
|
|
|
|
|
|
|
|
=over 4
|
|
|
|
|
2000-01-06 09:26:48 +08:00
|
|
|
=item B<input_password output_password>
|
|
|
|
|
|
|
|
The passwords for the input private key file (if present) and
|
|
|
|
the output private key file (if one will be created). The
|
2000-02-17 07:16:01 +08:00
|
|
|
command line options B<passin> and B<passout> override the
|
|
|
|
configuration file values.
|
2000-01-06 09:26:48 +08:00
|
|
|
|
1999-11-10 10:52:17 +08:00
|
|
|
=item B<default_bits>
|
|
|
|
|
2016-02-03 00:12:45 +08:00
|
|
|
Specifies the default key size in bits.
|
|
|
|
|
|
|
|
This option is used in conjunction with the B<-new> option to generate
|
|
|
|
a new key. It can be overridden by specifying an explicit key size in
|
|
|
|
the B<-newkey> option. The smallest accepted key size is 512 bits. If
|
|
|
|
no key size is specified then 2048 bits is used.
|
1999-11-10 10:52:17 +08:00
|
|
|
|
|
|
|
=item B<default_keyfile>
|
|
|
|
|
|
|
|
This is the default filename to write a private key to. If not
|
|
|
|
specified the key is written to standard output. This can be
|
2000-01-07 09:39:59 +08:00
|
|
|
overridden by the B<-keyout> option.
|
1999-11-10 10:52:17 +08:00
|
|
|
|
|
|
|
=item B<oid_file>
|
|
|
|
|
|
|
|
This specifies a file containing additional B<OBJECT IDENTIFIERS>.
|
|
|
|
Each line of the file should consist of the numerical form of the
|
2020-06-16 04:17:15 +08:00
|
|
|
object identifier followed by whitespace then the short name followed
|
|
|
|
by whitespace and finally the long name.
|
1999-11-10 10:52:17 +08:00
|
|
|
|
|
|
|
=item B<oid_section>
|
|
|
|
|
|
|
|
This specifies a section in the configuration file containing extra
|
1999-11-12 09:04:39 +08:00
|
|
|
object identifiers. Each line should consist of the short name of the
|
|
|
|
object identifier followed by B<=> and the numerical form. The short
|
1999-11-10 10:52:17 +08:00
|
|
|
and long names are the same when this option is used.
|
|
|
|
|
|
|
|
=item B<RANDFILE>
|
|
|
|
|
2017-07-05 22:58:48 +08:00
|
|
|
At startup the specified file is loaded into the random number generator,
|
|
|
|
and at exit 256 bytes will be written to it.
|
2000-02-25 01:18:51 +08:00
|
|
|
It is used for private key generation.
|
1999-11-10 10:52:17 +08:00
|
|
|
|
2000-01-06 09:26:48 +08:00
|
|
|
=item B<encrypt_key>
|
1999-11-10 10:52:17 +08:00
|
|
|
|
|
|
|
If this is set to B<no> then if a private key is generated it is
|
2020-05-11 21:41:08 +08:00
|
|
|
B<not> encrypted. This is equivalent to the B<-noenc> command line
|
2000-01-20 09:37:17 +08:00
|
|
|
option. For compatibility B<encrypt_rsa_key> is an equivalent option.
|
1999-11-10 10:52:17 +08:00
|
|
|
|
|
|
|
=item B<default_md>
|
|
|
|
|
2018-08-09 23:01:20 +08:00
|
|
|
This option specifies the digest algorithm to use. Any digest supported by the
|
|
|
|
OpenSSL B<dgst> command can be used. This option can be overridden on the
|
|
|
|
command line. Certain signing algorithms (i.e. Ed25519 and Ed448) will ignore
|
|
|
|
any digest that has been set.
|
1999-11-10 10:52:17 +08:00
|
|
|
|
2000-01-06 09:26:48 +08:00
|
|
|
=item B<string_mask>
|
1999-11-10 10:52:17 +08:00
|
|
|
|
2000-01-06 09:26:48 +08:00
|
|
|
This option masks out the use of certain string types in certain
|
|
|
|
fields. Most users will not need to change this option.
|
1999-11-10 10:52:17 +08:00
|
|
|
|
|
|
|
It can be set to several values B<default> which is also the default
|
2016-05-20 20:11:46 +08:00
|
|
|
option uses PrintableStrings, T61Strings and BMPStrings if the
|
1999-11-10 10:52:17 +08:00
|
|
|
B<pkix> value is used then only PrintableStrings and BMPStrings will
|
|
|
|
be used. This follows the PKIX recommendation in RFC2459. If the
|
|
|
|
B<utf8only> option is used then only UTF8Strings will be used: this
|
2000-01-06 09:26:48 +08:00
|
|
|
is the PKIX recommendation in RFC2459 after 2003. Finally the B<nombstr>
|
1999-11-10 10:52:17 +08:00
|
|
|
option just uses PrintableStrings and T61Strings: certain software has
|
2000-01-06 09:26:48 +08:00
|
|
|
problems with BMPStrings and UTF8Strings: in particular Netscape.
|
1999-11-10 10:52:17 +08:00
|
|
|
|
|
|
|
=item B<req_extensions>
|
|
|
|
|
2017-03-30 05:38:30 +08:00
|
|
|
This specifies the configuration file section containing a list of
|
1999-11-10 10:52:17 +08:00
|
|
|
extensions to add to the certificate request. It can be overridden
|
2016-05-20 20:11:46 +08:00
|
|
|
by the B<-reqexts> command line switch. See the
|
2015-08-18 03:21:33 +08:00
|
|
|
L<x509v3_config(5)> manual page for details of the
|
2006-11-07 20:51:27 +08:00
|
|
|
extension section format.
|
1999-11-10 10:52:17 +08:00
|
|
|
|
|
|
|
=item B<x509_extensions>
|
|
|
|
|
2017-03-30 05:38:30 +08:00
|
|
|
This specifies the configuration file section containing a list of
|
1999-11-10 10:52:17 +08:00
|
|
|
extensions to add to certificate generated when the B<-x509> switch
|
|
|
|
is used. It can be overridden by the B<-extensions> command line switch.
|
|
|
|
|
2000-01-20 09:37:17 +08:00
|
|
|
=item B<prompt>
|
|
|
|
|
2017-03-30 05:38:30 +08:00
|
|
|
If set to the value B<no> this disables prompting of certificate fields
|
2000-01-20 09:37:17 +08:00
|
|
|
and just takes values from the config file directly. It also changes the
|
|
|
|
expected format of the B<distinguished_name> and B<attributes> sections.
|
|
|
|
|
2001-10-26 20:40:38 +08:00
|
|
|
=item B<utf8>
|
|
|
|
|
2017-03-30 05:38:30 +08:00
|
|
|
If set to the value B<yes> then field values to be interpreted as UTF8
|
2001-10-26 20:40:38 +08:00
|
|
|
strings, by default they are interpreted as ASCII. This means that
|
|
|
|
the field values, whether prompted from a terminal or obtained from a
|
|
|
|
configuration file, must be valid UTF8 strings.
|
|
|
|
|
1999-11-10 10:52:17 +08:00
|
|
|
=item B<attributes>
|
|
|
|
|
2017-03-30 05:38:30 +08:00
|
|
|
This specifies the section containing any request attributes: its format
|
2000-01-20 09:37:17 +08:00
|
|
|
is the same as B<distinguished_name>. Typically these may contain the
|
|
|
|
challengePassword or unstructuredName types. They are currently ignored
|
|
|
|
by OpenSSL's request signing utilities but some CAs might want them.
|
1999-11-10 10:52:17 +08:00
|
|
|
|
|
|
|
=item B<distinguished_name>
|
|
|
|
|
2000-01-07 09:39:59 +08:00
|
|
|
This specifies the section containing the distinguished name fields to
|
2000-01-20 09:37:17 +08:00
|
|
|
prompt for when generating a certificate or certificate request. The format
|
|
|
|
is described in the next section.
|
|
|
|
|
|
|
|
=back
|
|
|
|
|
|
|
|
=head1 DISTINGUISHED NAME AND ATTRIBUTE SECTION FORMAT
|
|
|
|
|
|
|
|
There are two separate formats for the distinguished name and attribute
|
|
|
|
sections. If the B<prompt> option is set to B<no> then these sections
|
|
|
|
just consist of field names and values: for example,
|
1999-11-10 10:52:17 +08:00
|
|
|
|
2000-01-20 09:37:17 +08:00
|
|
|
CN=My Name
|
|
|
|
OU=My Organization
|
2000-02-04 07:23:24 +08:00
|
|
|
emailAddress=someone@somewhere.org
|
2000-01-20 09:37:17 +08:00
|
|
|
|
Command docs: fix up command references
Almost all OpenSSL commands are in reality 'openssl cmd', so make sure
they are refered to like that and not just as the sub-command.
Self-references are avoided as much as is possible, and replaced with
"this command". In some cases, we even avoid that with a slight
rewrite of the sentence or paragrah they were in. However, in the few
cases where a self-reference is still admissible, they are done in
bold, i.e. openssl-speed.pod references itself like this:
B<openssl speed>
References to other commands are done as manual links, i.e. CA.pl.pod
references 'openssl req' like this: L<openssl-req(1)>
Some commands are examples rather than references; we enclose those in
C<>.
While we are it, we abolish "utility", replacing it with "command", or
remove it entirely in some cases.
Reviewed-by: Tomas Mraz <tmraz@fedoraproject.org>
(Merged from https://github.com/openssl/openssl/pull/10065)
2019-10-02 01:43:36 +08:00
|
|
|
This allows external programs (e.g. GUI based) to generate a template file with
|
|
|
|
all the field names and values and just pass it to this command. An example
|
2000-02-18 08:54:21 +08:00
|
|
|
of this kind of configuration file is contained in the B<EXAMPLES> section.
|
2000-01-20 09:37:17 +08:00
|
|
|
|
2000-02-18 08:54:21 +08:00
|
|
|
Alternatively if the B<prompt> option is absent or not set to B<no> then the
|
2000-01-20 09:37:17 +08:00
|
|
|
file contains field prompting information. It consists of lines of the form:
|
|
|
|
|
|
|
|
fieldName="prompt"
|
|
|
|
fieldName_default="default field value"
|
|
|
|
fieldName_min= 2
|
|
|
|
fieldName_max= 4
|
1999-11-10 10:52:17 +08:00
|
|
|
|
2000-01-02 00:42:49 +08:00
|
|
|
"fieldName" is the field name being used, for example commonName (or CN).
|
2000-01-07 09:39:59 +08:00
|
|
|
The "prompt" string is used to ask the user to enter the relevant
|
1999-11-10 10:52:17 +08:00
|
|
|
details. If the user enters nothing then the default value is used if no
|
|
|
|
default value is present then the field is omitted. A field can
|
|
|
|
still be omitted if a default value is present if the user just
|
|
|
|
enters the '.' character.
|
|
|
|
|
|
|
|
The number of characters entered must be between the fieldName_min and
|
|
|
|
fieldName_max limits: there may be additional restrictions based
|
|
|
|
on the field being used (for example countryName can only ever be
|
|
|
|
two characters long and must fit in a PrintableString).
|
|
|
|
|
|
|
|
Some fields (such as organizationName) can be used more than once
|
|
|
|
in a DN. This presents a problem because configuration files will
|
2000-01-20 09:37:17 +08:00
|
|
|
not recognize the same name occurring twice. To avoid this problem
|
2000-02-18 08:54:21 +08:00
|
|
|
if the fieldName contains some characters followed by a full stop
|
1999-11-10 10:52:17 +08:00
|
|
|
they will be ignored. So for example a second organizationName can
|
|
|
|
be input by calling it "1.organizationName".
|
|
|
|
|
|
|
|
The actual permitted field names are any object identifier short or
|
|
|
|
long names. These are compiled into OpenSSL and include the usual
|
|
|
|
values such as commonName, countryName, localityName, organizationName,
|
2014-04-24 09:58:30 +08:00
|
|
|
organizationalUnitName, stateOrProvinceName. Additionally emailAddress
|
2018-12-20 20:56:03 +08:00
|
|
|
is included as well as name, surname, givenName, initials, and dnQualifier.
|
1999-11-10 10:52:17 +08:00
|
|
|
|
|
|
|
Additional object identifiers can be defined with the B<oid_file> or
|
|
|
|
B<oid_section> options in the configuration file. Any additional fields
|
|
|
|
will be treated as though they were a DirectoryString.
|
|
|
|
|
1999-11-12 02:41:31 +08:00
|
|
|
|
1999-11-10 10:52:17 +08:00
|
|
|
=head1 EXAMPLES
|
|
|
|
|
|
|
|
Examine and verify certificate request:
|
|
|
|
|
1999-11-12 09:04:39 +08:00
|
|
|
openssl req -in req.pem -text -verify -noout
|
1999-11-10 10:52:17 +08:00
|
|
|
|
|
|
|
Create a private key and then generate a certificate request from it:
|
|
|
|
|
2015-07-31 23:52:57 +08:00
|
|
|
openssl genrsa -out key.pem 2048
|
1999-11-12 09:04:39 +08:00
|
|
|
openssl req -new -key key.pem -out req.pem
|
1999-11-10 10:52:17 +08:00
|
|
|
|
|
|
|
The same but just using req:
|
|
|
|
|
2015-07-31 23:52:57 +08:00
|
|
|
openssl req -newkey rsa:2048 -keyout key.pem -out req.pem
|
1999-11-10 10:52:17 +08:00
|
|
|
|
|
|
|
Generate a self signed root certificate:
|
|
|
|
|
2015-07-31 23:52:57 +08:00
|
|
|
openssl req -x509 -newkey rsa:2048 -keyout key.pem -out req.pem
|
1999-11-12 09:04:39 +08:00
|
|
|
|
2019-06-05 14:46:48 +08:00
|
|
|
Create an SM2 private key and then generate a certificate request from it:
|
|
|
|
|
|
|
|
openssl ecparam -genkey -name SM2 -out sm2.key
|
2020-03-11 06:08:59 +08:00
|
|
|
openssl req -new -key sm2.key -out sm2.csr -sm3 -sigopt "distid:1234567812345678"
|
2019-06-05 14:46:48 +08:00
|
|
|
|
|
|
|
Examine and verify an SM2 certificate request:
|
|
|
|
|
2020-03-11 06:08:59 +08:00
|
|
|
openssl req -verify -in sm2.csr -sm3 -vfyopt "distid:1234567812345678"
|
2019-06-05 14:46:48 +08:00
|
|
|
|
1999-11-12 09:04:39 +08:00
|
|
|
Example of a file pointed to by the B<oid_file> option:
|
|
|
|
|
2016-05-20 20:11:46 +08:00
|
|
|
1.2.3.4 shortName A longer Name
|
|
|
|
1.2.3.6 otherName Other longer Name
|
1999-11-12 09:04:39 +08:00
|
|
|
|
|
|
|
Example of a section pointed to by B<oid_section> making use of variable
|
|
|
|
expansion:
|
|
|
|
|
|
|
|
testoid1=1.2.3.5
|
|
|
|
testoid2=${testoid1}.6
|
|
|
|
|
2000-01-20 09:37:17 +08:00
|
|
|
Sample configuration file prompting for field values:
|
1999-11-12 09:04:39 +08:00
|
|
|
|
|
|
|
[ req ]
|
2016-05-20 20:11:46 +08:00
|
|
|
default_bits = 2048
|
|
|
|
default_keyfile = privkey.pem
|
|
|
|
distinguished_name = req_distinguished_name
|
|
|
|
attributes = req_attributes
|
|
|
|
req_extensions = v3_ca
|
1999-11-12 09:04:39 +08:00
|
|
|
|
|
|
|
dirstring_type = nobmp
|
|
|
|
|
|
|
|
[ req_distinguished_name ]
|
2016-05-20 20:11:46 +08:00
|
|
|
countryName = Country Name (2 letter code)
|
|
|
|
countryName_default = AU
|
|
|
|
countryName_min = 2
|
|
|
|
countryName_max = 2
|
1999-11-12 09:04:39 +08:00
|
|
|
|
2016-05-20 20:11:46 +08:00
|
|
|
localityName = Locality Name (eg, city)
|
1999-11-12 09:04:39 +08:00
|
|
|
|
2016-05-20 20:11:46 +08:00
|
|
|
organizationalUnitName = Organizational Unit Name (eg, section)
|
1999-11-12 09:04:39 +08:00
|
|
|
|
2016-05-20 20:11:46 +08:00
|
|
|
commonName = Common Name (eg, YOUR name)
|
|
|
|
commonName_max = 64
|
1999-11-12 09:04:39 +08:00
|
|
|
|
2016-05-20 20:11:46 +08:00
|
|
|
emailAddress = Email Address
|
|
|
|
emailAddress_max = 40
|
1999-11-12 09:04:39 +08:00
|
|
|
|
|
|
|
[ req_attributes ]
|
2016-05-20 20:11:46 +08:00
|
|
|
challengePassword = A challenge password
|
|
|
|
challengePassword_min = 4
|
|
|
|
challengePassword_max = 20
|
1999-11-12 09:04:39 +08:00
|
|
|
|
|
|
|
[ v3_ca ]
|
|
|
|
|
|
|
|
subjectKeyIdentifier=hash
|
|
|
|
authorityKeyIdentifier=keyid:always,issuer:always
|
2016-06-13 10:21:54 +08:00
|
|
|
basicConstraints = critical, CA:true
|
1999-11-10 10:52:17 +08:00
|
|
|
|
2000-01-20 09:37:17 +08:00
|
|
|
Sample configuration containing all field values:
|
|
|
|
|
|
|
|
|
|
|
|
[ req ]
|
2016-05-20 20:11:46 +08:00
|
|
|
default_bits = 2048
|
|
|
|
default_keyfile = keyfile.pem
|
|
|
|
distinguished_name = req_distinguished_name
|
|
|
|
attributes = req_attributes
|
|
|
|
prompt = no
|
|
|
|
output_password = mypass
|
2000-01-20 09:37:17 +08:00
|
|
|
|
|
|
|
[ req_distinguished_name ]
|
2016-05-20 20:11:46 +08:00
|
|
|
C = GB
|
|
|
|
ST = Test State or Province
|
|
|
|
L = Test Locality
|
|
|
|
O = Organization Name
|
|
|
|
OU = Organizational Unit Name
|
|
|
|
CN = Common Name
|
|
|
|
emailAddress = test@email.address
|
2000-01-20 09:37:17 +08:00
|
|
|
|
|
|
|
[ req_attributes ]
|
2016-05-20 20:11:46 +08:00
|
|
|
challengePassword = A challenge password
|
2000-01-20 09:37:17 +08:00
|
|
|
|
2017-12-28 01:29:36 +08:00
|
|
|
Example of giving the most common attributes (subject and extensions)
|
|
|
|
on the command line:
|
|
|
|
|
|
|
|
openssl req -new -subj "/C=GB/CN=foo" \
|
|
|
|
-addext "subjectAltName = DNS:foo.co.uk" \
|
|
|
|
-addext "certificatePolicies = 1.2.3.4" \
|
|
|
|
-newkey rsa:2048 -keyout key.pem -out req.pem
|
|
|
|
|
2000-01-20 09:37:17 +08:00
|
|
|
|
1999-11-10 10:52:17 +08:00
|
|
|
=head1 NOTES
|
|
|
|
|
|
|
|
The certificate requests generated by B<Xenroll> with MSIE have extensions
|
|
|
|
added. It includes the B<keyUsage> extension which determines the type of
|
|
|
|
key (signature only or general purpose) and any additional OIDs entered
|
2019-10-10 09:48:33 +08:00
|
|
|
by the script in an B<extendedKeyUsage> extension.
|
1999-11-10 10:52:17 +08:00
|
|
|
|
|
|
|
=head1 DIAGNOSTICS
|
|
|
|
|
|
|
|
The following messages are frequently asked about:
|
|
|
|
|
2016-05-20 20:11:46 +08:00
|
|
|
Using configuration from /some/path/openssl.cnf
|
|
|
|
Unable to load config info
|
1999-11-10 10:52:17 +08:00
|
|
|
|
2019-10-02 03:10:17 +08:00
|
|
|
This is followed some time later by:
|
1999-11-10 10:52:17 +08:00
|
|
|
|
2016-05-20 20:11:46 +08:00
|
|
|
unable to find 'distinguished_name' in config
|
|
|
|
problems making Certificate Request
|
1999-11-10 10:52:17 +08:00
|
|
|
|
|
|
|
The first error message is the clue: it can't find the configuration
|
|
|
|
file! Certain operations (like examining a certificate request) don't
|
|
|
|
need a configuration file so its use isn't enforced. Generation of
|
2000-01-07 09:39:59 +08:00
|
|
|
certificates or requests however does need a configuration file. This
|
1999-11-10 10:52:17 +08:00
|
|
|
could be regarded as a bug.
|
|
|
|
|
|
|
|
Another puzzling message is this:
|
|
|
|
|
|
|
|
Attributes:
|
|
|
|
a0:00
|
|
|
|
|
|
|
|
this is displayed when no attributes are present and the request includes
|
|
|
|
the correct empty B<SET OF> structure (the DER encoding of which is 0xa0
|
|
|
|
0x00). If you just see:
|
|
|
|
|
|
|
|
Attributes:
|
|
|
|
|
|
|
|
then the B<SET OF> is missing and the encoding is technically invalid (but
|
|
|
|
it is tolerated). See the description of the command line option B<-asn1-kludge>
|
|
|
|
for more information.
|
|
|
|
|
|
|
|
=head1 BUGS
|
|
|
|
|
2000-01-07 09:39:59 +08:00
|
|
|
OpenSSL's handling of T61Strings (aka TeletexStrings) is broken: it effectively
|
|
|
|
treats them as ISO-8859-1 (Latin 1), Netscape and MSIE have similar behaviour.
|
1999-11-10 10:52:17 +08:00
|
|
|
This can cause problems if you need characters that aren't available in
|
|
|
|
PrintableStrings and you don't want to or can't use BMPStrings.
|
|
|
|
|
|
|
|
As a consequence of the T61String handling the only correct way to represent
|
|
|
|
accented characters in OpenSSL is to use a BMPString: unfortunately Netscape
|
|
|
|
currently chokes on these. If you have to use accented characters with Netscape
|
|
|
|
and MSIE then you currently need to use the invalid T61String form.
|
|
|
|
|
2000-01-20 09:37:17 +08:00
|
|
|
The current prompting is not very friendly. It doesn't allow you to confirm what
|
|
|
|
you've just entered. Other things like extensions in certificate requests are
|
|
|
|
statically defined in the configuration file. Some of these: like an email
|
|
|
|
address in subjectAltName should be input by the user.
|
1999-11-10 10:52:17 +08:00
|
|
|
|
|
|
|
=head1 SEE ALSO
|
|
|
|
|
2019-08-22 07:04:41 +08:00
|
|
|
L<openssl(1)>,
|
|
|
|
L<openssl-x509(1)>,
|
|
|
|
L<openssl-ca(1)>,
|
|
|
|
L<openssl-genrsa(1)>,
|
|
|
|
L<openssl-gendsa(1)>,
|
|
|
|
L<config(5)>,
|
2016-05-20 20:11:46 +08:00
|
|
|
L<x509v3_config(5)>
|
1999-11-10 10:52:17 +08:00
|
|
|
|
2020-03-05 03:41:53 +08:00
|
|
|
=head1 HISTORY
|
|
|
|
|
|
|
|
The B<-section> option was added in OpenSSL 3.0.0.
|
|
|
|
|
2020-09-02 19:52:23 +08:00
|
|
|
All B<-keyform> values except B<ENGINE> and the B<-multivalue-rdn> option
|
|
|
|
have become obsolete in OpenSSL 3.0.0 and have no effect.
|
2020-05-06 19:51:50 +08:00
|
|
|
|
2020-06-25 09:27:51 +08:00
|
|
|
The B<-engine> option was deprecated in OpenSSL 3.0.
|
2020-05-11 21:41:08 +08:00
|
|
|
The <-nodes> option was deprecated in OpenSSL 3.0, too; use B<-noenc> instead.
|
2020-06-25 09:27:51 +08:00
|
|
|
|
2016-05-18 23:44:05 +08:00
|
|
|
=head1 COPYRIGHT
|
|
|
|
|
2020-04-23 20:55:52 +08:00
|
|
|
Copyright 2000-2020 The OpenSSL Project Authors. All Rights Reserved.
|
2016-05-18 23:44:05 +08:00
|
|
|
|
2018-12-06 21:04:11 +08:00
|
|
|
Licensed under the Apache License 2.0 (the "License"). You may not use
|
2016-05-18 23:44:05 +08:00
|
|
|
this file except in compliance with the License. You can obtain a copy
|
|
|
|
in the file LICENSE in the source distribution or at
|
|
|
|
L<https://www.openssl.org/source/license.html>.
|
|
|
|
|
|
|
|
=cut
|