parent
c76e5b08a1
commit
040ed7b4d0
15 changed files with 18 additions and 18 deletions
|
@ -105,7 +105,7 @@
|
||||||
* in the asn1 der encoding
|
* in the asn1 der encoding
|
||||||
* possible values: named_curve (default)
|
* possible values: named_curve (default)
|
||||||
* explicit
|
* explicit
|
||||||
* -no_seed - if 'explicit' parameters are choosen do not use the seed
|
* -no_seed - if 'explicit' parameters are chosen do not use the seed
|
||||||
* -genkey - generate ec key
|
* -genkey - generate ec key
|
||||||
* -rand file - files to use for random number input
|
* -rand file - files to use for random number input
|
||||||
* -engine e - use engine e, possibly a hardware device
|
* -engine e - use engine e, possibly a hardware device
|
||||||
|
@ -286,7 +286,7 @@ bad:
|
||||||
BIO_printf(bio_err, " "
|
BIO_printf(bio_err, " "
|
||||||
" explicit\n");
|
" explicit\n");
|
||||||
BIO_printf(bio_err, " -no_seed if 'explicit'"
|
BIO_printf(bio_err, " -no_seed if 'explicit'"
|
||||||
" parameters are choosen do not"
|
" parameters are chosen do not"
|
||||||
" use the seed\n");
|
" use the seed\n");
|
||||||
BIO_printf(bio_err, " -genkey generate ec"
|
BIO_printf(bio_err, " -genkey generate ec"
|
||||||
" key\n");
|
" key\n");
|
||||||
|
|
|
@ -305,7 +305,7 @@ static ERR_STRING_DATA ASN1_str_reasons[]=
|
||||||
{ERR_REASON(ASN1_R_UNKNOWN_PUBLIC_KEY_TYPE),"unknown public key type"},
|
{ERR_REASON(ASN1_R_UNKNOWN_PUBLIC_KEY_TYPE),"unknown public key type"},
|
||||||
{ERR_REASON(ASN1_R_UNKNOWN_SIGNATURE_ALGORITHM),"unknown signature algorithm"},
|
{ERR_REASON(ASN1_R_UNKNOWN_SIGNATURE_ALGORITHM),"unknown signature algorithm"},
|
||||||
{ERR_REASON(ASN1_R_UNKNOWN_TAG) ,"unknown tag"},
|
{ERR_REASON(ASN1_R_UNKNOWN_TAG) ,"unknown tag"},
|
||||||
{ERR_REASON(ASN1_R_UNKOWN_FORMAT) ,"unkown format"},
|
{ERR_REASON(ASN1_R_UNKOWN_FORMAT) ,"unknown format"},
|
||||||
{ERR_REASON(ASN1_R_UNSUPPORTED_ANY_DEFINED_BY_TYPE),"unsupported any defined by type"},
|
{ERR_REASON(ASN1_R_UNSUPPORTED_ANY_DEFINED_BY_TYPE),"unsupported any defined by type"},
|
||||||
{ERR_REASON(ASN1_R_UNSUPPORTED_CIPHER) ,"unsupported cipher"},
|
{ERR_REASON(ASN1_R_UNSUPPORTED_CIPHER) ,"unsupported cipher"},
|
||||||
{ERR_REASON(ASN1_R_UNSUPPORTED_ENCRYPTION_ALGORITHM),"unsupported encryption algorithm"},
|
{ERR_REASON(ASN1_R_UNSUPPORTED_ENCRYPTION_ALGORITHM),"unsupported encryption algorithm"},
|
||||||
|
|
|
@ -119,7 +119,7 @@ variable points to a section containing further ENGINE configuration
|
||||||
information.
|
information.
|
||||||
|
|
||||||
The section pointed to by B<engines> is a table of engine names (though see
|
The section pointed to by B<engines> is a table of engine names (though see
|
||||||
B<engine_id> below) and further sections containing configuration informations
|
B<engine_id> below) and further sections containing configuration information
|
||||||
specific to each ENGINE.
|
specific to each ENGINE.
|
||||||
|
|
||||||
Each ENGINE specific section is used to set default algorithms, load
|
Each ENGINE specific section is used to set default algorithms, load
|
||||||
|
|
|
@ -41,7 +41,7 @@ PKCS#8 private key format use the B<pkcs8> command.
|
||||||
|
|
||||||
This specifies the input format. The B<DER> option with a private key uses
|
This specifies the input format. The B<DER> option with a private key uses
|
||||||
an ASN.1 DER encoded SEC1 private key. When used with a public key it
|
an ASN.1 DER encoded SEC1 private key. When used with a public key it
|
||||||
uses the SubjectPublicKeyInfo structur as specified in RFC 3280.
|
uses the SubjectPublicKeyInfo structure as specified in RFC 3280.
|
||||||
The B<PEM> form is the default format: it consists of the B<DER> format base64
|
The B<PEM> form is the default format: it consists of the B<DER> format base64
|
||||||
encoded with additional header and footer lines. In the case of a private key
|
encoded with additional header and footer lines. In the case of a private key
|
||||||
PKCS#8 format is also accepted.
|
PKCS#8 format is also accepted.
|
||||||
|
|
|
@ -75,7 +75,7 @@ L<openssl(1)|openssl(1)>.
|
||||||
|
|
||||||
=item B<-passout arg>
|
=item B<-passout arg>
|
||||||
|
|
||||||
pass phrase source to encrypt any outputed private keys with. For more
|
pass phrase source to encrypt any outputted private keys with. For more
|
||||||
information about the format of B<arg> see the B<PASS PHRASE ARGUMENTS> section
|
information about the format of B<arg> see the B<PASS PHRASE ARGUMENTS> section
|
||||||
in L<openssl(1)|openssl(1)>.
|
in L<openssl(1)|openssl(1)>.
|
||||||
|
|
||||||
|
|
|
@ -303,7 +303,7 @@ Reverses effect of B<-asn1-kludge>
|
||||||
|
|
||||||
=item B<-newhdr>
|
=item B<-newhdr>
|
||||||
|
|
||||||
Adds the word B<NEW> to the PEM file header and footer lines on the outputed
|
Adds the word B<NEW> to the PEM file header and footer lines on the outputted
|
||||||
request. Some software (Netscape certificate server) and some CAs need this.
|
request. Some software (Netscape certificate server) and some CAs need this.
|
||||||
|
|
||||||
=item B<-batch>
|
=item B<-batch>
|
||||||
|
|
|
@ -111,7 +111,7 @@ by using an appropriate certificate.
|
||||||
|
|
||||||
=item B<-dcertform format>, B<-dkeyform format>, B<-dpass arg>
|
=item B<-dcertform format>, B<-dkeyform format>, B<-dpass arg>
|
||||||
|
|
||||||
addtional certificate and private key format and passphrase respectively.
|
additional certificate and private key format and passphrase respectively.
|
||||||
|
|
||||||
=item B<-nocert>
|
=item B<-nocert>
|
||||||
|
|
||||||
|
|
|
@ -352,7 +352,7 @@ switch always overrides the settings in the config file.
|
||||||
|
|
||||||
This is the main section and it specifies the name of another section
|
This is the main section and it specifies the name of another section
|
||||||
that contains all the options for the B<-reply> command. This default
|
that contains all the options for the B<-reply> command. This default
|
||||||
section can be overriden with the B<-section> command line switch. (Optional)
|
section can be overridden with the B<-section> command line switch. (Optional)
|
||||||
|
|
||||||
=item B<oid_file>
|
=item B<oid_file>
|
||||||
|
|
||||||
|
@ -453,7 +453,7 @@ included. Default is no. (Optional)
|
||||||
=head1 ENVIRONMENT VARIABLES
|
=head1 ENVIRONMENT VARIABLES
|
||||||
|
|
||||||
B<OPENSSL_CONF> contains the path of the configuration file and can be
|
B<OPENSSL_CONF> contains the path of the configuration file and can be
|
||||||
overriden by the B<-config> command line option.
|
overridden by the B<-config> command line option.
|
||||||
|
|
||||||
=head1 EXAMPLES
|
=head1 EXAMPLES
|
||||||
|
|
||||||
|
|
|
@ -124,7 +124,7 @@ The name of an EGD socket to get random data from. (Optional)
|
||||||
=item [request]...
|
=item [request]...
|
||||||
|
|
||||||
List of files containing B<RFC 3161> DER-encoded time stamp requests. If no
|
List of files containing B<RFC 3161> DER-encoded time stamp requests. If no
|
||||||
requests are specifed only one request will be sent to the server and it will be
|
requests are specified only one request will be sent to the server and it will be
|
||||||
read from the standard input. (Optional)
|
read from the standard input. (Optional)
|
||||||
|
|
||||||
=back
|
=back
|
||||||
|
|
|
@ -48,7 +48,7 @@ necessary parameters are set, by re-creating the blinding parameters.
|
||||||
|
|
||||||
BN_BLINDING_convert_ex() multiplies B<n> with the blinding factor B<A>.
|
BN_BLINDING_convert_ex() multiplies B<n> with the blinding factor B<A>.
|
||||||
If B<r> is not NULL a copy the inverse blinding factor B<Ai> will be
|
If B<r> is not NULL a copy the inverse blinding factor B<Ai> will be
|
||||||
returned in B<r> (this is useful if a B<RSA> object is shared amoung
|
returned in B<r> (this is useful if a B<RSA> object is shared among
|
||||||
several threads). BN_BLINDING_invert_ex() multiplies B<n> with the
|
several threads). BN_BLINDING_invert_ex() multiplies B<n> with the
|
||||||
inverse blinding factor B<Ai>. If B<r> is not NULL it will be used as
|
inverse blinding factor B<Ai>. If B<r> is not NULL it will be used as
|
||||||
the inverse blinding.
|
the inverse blinding.
|
||||||
|
|
|
@ -17,7 +17,7 @@ EVP_BytesToKey - password based encryption routine
|
||||||
|
|
||||||
EVP_BytesToKey() derives a key and IV from various parameters. B<type> is
|
EVP_BytesToKey() derives a key and IV from various parameters. B<type> is
|
||||||
the cipher to derive the key and IV for. B<md> is the message digest to use.
|
the cipher to derive the key and IV for. B<md> is the message digest to use.
|
||||||
The B<salt> paramter is used as a salt in the derivation: it should point to
|
The B<salt> parameter is used as a salt in the derivation: it should point to
|
||||||
an 8 byte buffer or NULL if no salt is used. B<data> is a buffer containing
|
an 8 byte buffer or NULL if no salt is used. B<data> is a buffer containing
|
||||||
B<datal> bytes which is used to derive the keying data. B<count> is the
|
B<datal> bytes which is used to derive the keying data. B<count> is the
|
||||||
iteration count to use. The derived key and IV will be written to B<key>
|
iteration count to use. The derived key and IV will be written to B<key>
|
||||||
|
|
|
@ -152,7 +152,7 @@ does not remain in memory.
|
||||||
|
|
||||||
EVP_EncryptInit(), EVP_DecryptInit() and EVP_CipherInit() behave in a
|
EVP_EncryptInit(), EVP_DecryptInit() and EVP_CipherInit() behave in a
|
||||||
similar way to EVP_EncryptInit_ex(), EVP_DecryptInit_ex and
|
similar way to EVP_EncryptInit_ex(), EVP_DecryptInit_ex and
|
||||||
EVP_CipherInit_ex() except the B<ctx> paramter does not need to be
|
EVP_CipherInit_ex() except the B<ctx> parameter does not need to be
|
||||||
initialized and they always use the default cipher implementation.
|
initialized and they always use the default cipher implementation.
|
||||||
|
|
||||||
EVP_EncryptFinal(), EVP_DecryptFinal() and EVP_CipherFinal() behave in a
|
EVP_EncryptFinal(), EVP_DecryptFinal() and EVP_CipherFinal() behave in a
|
||||||
|
|
|
@ -113,7 +113,7 @@ a special status code is set to the verification callback. This permits it
|
||||||
to examine the valid policy tree and perform additional checks or simply
|
to examine the valid policy tree and perform additional checks or simply
|
||||||
log it for debugging purposes.
|
log it for debugging purposes.
|
||||||
|
|
||||||
By default some addtional features such as indirect CRLs and CRLs signed by
|
By default some additional features such as indirect CRLs and CRLs signed by
|
||||||
different keys are disabled. If B<X509_V_FLAG_EXTENDED_CRL_SUPPORT> is set
|
different keys are disabled. If B<X509_V_FLAG_EXTENDED_CRL_SUPPORT> is set
|
||||||
they are enabled.
|
they are enabled.
|
||||||
|
|
||||||
|
|
|
@ -201,7 +201,7 @@ handle PKCS#8 format encrypted and unencrypted keys too.
|
||||||
PEM_write_bio_PKCS8PrivateKey() and PEM_write_PKCS8PrivateKey()
|
PEM_write_bio_PKCS8PrivateKey() and PEM_write_PKCS8PrivateKey()
|
||||||
write a private key in an EVP_PKEY structure in PKCS#8
|
write a private key in an EVP_PKEY structure in PKCS#8
|
||||||
EncryptedPrivateKeyInfo format using PKCS#5 v2.0 password based encryption
|
EncryptedPrivateKeyInfo format using PKCS#5 v2.0 password based encryption
|
||||||
algorithms. The B<cipher> argument specifies the encryption algoritm to
|
algorithms. The B<cipher> argument specifies the encryption algorithm to
|
||||||
use: unlike all other PEM routines the encryption is applied at the
|
use: unlike all other PEM routines the encryption is applied at the
|
||||||
PKCS#8 level and not in the PEM headers. If B<cipher> is NULL then no
|
PKCS#8 level and not in the PEM headers. If B<cipher> is NULL then no
|
||||||
encryption is used and a PKCS#8 PrivateKeyInfo structure is used instead.
|
encryption is used and a PKCS#8 PrivateKeyInfo structure is used instead.
|
||||||
|
|
|
@ -169,8 +169,8 @@ that will always continue the TLS/SSL handshake regardless of verification
|
||||||
failure, if wished. The callback realizes a verification depth limit with
|
failure, if wished. The callback realizes a verification depth limit with
|
||||||
more informational output.
|
more informational output.
|
||||||
|
|
||||||
All verification errors are printed, informations about the certificate chain
|
All verification errors are printed; information about the certificate chain
|
||||||
are printed on request.
|
is printed on request.
|
||||||
The example is realized for a server that does allow but not require client
|
The example is realized for a server that does allow but not require client
|
||||||
certificates.
|
certificates.
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue