Commit 0286d944 authored by Dr. Stephen Henson's avatar Dr. Stephen Henson
Browse files

Add info about the header and footer lines used in PEM formats

and add an nseq manpage.
parent 938ead8f
Loading
Loading
Loading
Loading
+7 −0
Original line number Diff line number Diff line
@@ -117,6 +117,13 @@ a public key.

=back

=head1 NOTES

The PEM private key format uses the header and footer lines:

 -----BEGIN DSA PRIVATE KEY-----
 -----END DSA PRIVATE KEY-----

=head1 EXAMPLES

To remove the pass phrase on a DSA private key:
+5 −0
Original line number Diff line number Diff line
@@ -82,6 +82,11 @@ the input file (if any) is ignored.

=head1 NOTES

PEM format DSA parameters use the header and footer lines:

 -----BEGIN DSA PARAMETERS-----
 -----END DSA PARAMETERS-----

DSA parameter generation is a slow process and as a result the same set of
DSA parameters is often used to generate several distinct keys.

doc/man/nseq.pod

0 → 100644
+70 −0
Original line number Diff line number Diff line
=pod

=head1 NAME

nseq - create or examine a netscape certificate sequence

=head1 SYNOPSIS

B<openssl> B<nseq>
[B<-in filename>]
[B<-out filename>]
[B<-toseq>]

=head1 DESCRIPTION

The B<nseq> command takes a file containing a Netscape certificate
sequence and prints out the certificates contained in it or takes a
file of certificates and converts it into a Netscape certificate
sequence.

=head1 COMMAND OPTIONS

=over 4

=item B<-in filename>

This specifies the input filename to read or standard input if this
option is not specified.

=item B<-out filename>

specifies the output filename or standard output by default.

=item B<-toseq>

normally a Netscape certificate sequence will be input and the output
is the certificates contained in it. With the B<-toseq> option the
situation is reversed: a Netscape certificate sequence is created from
a file of certificates.

=back

=head1 EXAMPLES

Output the certificates in a Netscape certificate sequence

 openssl nseq -in nseq.pem -out certs.pem

Create a Netscape certificate sequence

 openssl nseq -in certs.pem -toseq -out nseq.pem

=head1 NOTES

The B<PEM> encoded form uses the same headers and footers as a certificate:

 -----BEGIN CERTIFICATE-----
 -----END CERTIFICATE-----

A Netscape certificate sequence is a Netscape specific form that can be sent
to browsers as an alternative to the standard PKCS#7 format when several
certificates are sent to the browser: for example during certificate erollment.
It is used by Netscape certificate server for example.

=head1 BUGS

This program needs a few more options: like allowing DER or PEM input and
output files and allowing multiple certificate files to be used.

=cut
+11 −0
Original line number Diff line number Diff line
@@ -93,6 +93,17 @@ B<des>, B<des3> and B<rc2>. It is recommended that B<des3> is used.

=head1 NOTES

The encrypted form of a PEM encode PKCS#8 files uses the following
headers and footers:

 -----BEGIN ENCRYPTED PRIVATE KEY-----
 -----END ENCRYPTED PRIVATE KEY-----

The unencrypted form uses:

 -----BEGIN PRIVATE KEY-----
 -----END PRIVATE KEY-----

Private keys encrypted using PKCS#5 v2.0 algorithms and high iteration
counts are more secure that those encrypted using the traditional
SSLeay compatible formats. So if additional security is considered
+11 −5
Original line number Diff line number Diff line
@@ -371,11 +371,17 @@ Sample configuration file:

=head1 NOTES

The header and footer lines in the B<PEM> format contain the words
B<BEGIN CERTIFICATE REQUEST> and B<END CERTIFICATE REQUEST> some software
(for example some versions of Netscape certificate server) requires the
words B<BEGIN NEW CERTIFICATE REQUEST> and B<END NEW CERTIFICATE REQUEST>
instead.
The header and footer lines in the B<PEM> format are respectively:

 -----BEGIN CERTIFICATE REQUEST----
 -----END CERTIFICATE REQUEST----

some software (some versions of Netscape certificate server) instead needs:

 -----BEGIN NEW CERTIFICATE REQUEST----
 -----END NEW CERTIFICATE REQUEST----

but is otherwise compatible. Either form is accepted on input.

The certificate requests generated by B<Xenroll> with MSIE have extensions
added. It includes the B<keyUsage> extension which determines the type of
Loading