Index: openssl/doc/apps/req.pod |
=================================================================== |
--- openssl/doc/apps/req.pod (revision 105093) |
+++ openssl/doc/apps/req.pod (working copy) |
@@ -22,12 +22,13 @@ |
[B<-new>] |
[B<-rand file(s)>] |
[B<-newkey rsa:bits>] |
-[B<-newkey dsa:file>] |
+[B<-newkey alg:file>] |
[B<-nodes>] |
[B<-key filename>] |
[B<-keyform PEM|DER>] |
[B<-keyout filename>] |
-[B<-[md5|sha1|md2|mdc2]>] |
+[B<-keygen_engine id>] |
+[B<-[digest]>] |
[B<-config filename>] |
[B<-subj arg>] |
[B<-multivalue-rdn>] |
@@ -35,11 +36,15 @@ |
[B<-days n>] |
[B<-set_serial n>] |
[B<-asn1-kludge>] |
+[B<-no-asn1-kludge>] |
[B<-newhdr>] |
[B<-extensions section>] |
[B<-reqexts section>] |
[B<-utf8>] |
[B<-nameopt>] |
+[B<-reqopt>] |
+[B<-subject>] |
+[B<-subj arg>] |
[B<-batch>] |
[B<-verbose>] |
[B<-engine id>] |
@@ -91,6 +96,11 @@ |
prints out the certificate request in text form. |
+=item B<-subject> |
+ |
+prints out the request subject (or certificate subject if B<-x509> is |
+specified) |
+ |
=item B<-pubkey> |
outputs the public key. |
@@ -118,6 +128,13 @@ |
If the B<-key> option is not used it will generate a new RSA private |
key using information specified in the configuration file. |
+=item B<-subj arg> |
+ |
+Replaces subject field of input request with specified data and outputs |
+modified request. The arg must be formatted as |
+I</type0=value0/type1=value1/type2=...>, |
+characters may be escaped by \ (backslash), no spaces are skipped. |
+ |
=item B<-rand file(s)> |
a file or files containing random data used to seed the random number |
@@ -129,11 +146,36 @@ |
=item B<-newkey arg> |
this option creates a new certificate request and a new private |
-key. The argument takes one of two forms. B<rsa:nbits>, where |
+key. The argument takes one of several forms. B<rsa:nbits>, where |
B<nbits> is the number of bits, generates an RSA key B<nbits> |
-in size. B<dsa:filename> generates a DSA key using the parameters |
-in the file B<filename>. |
+in size. If B<nbits> is omitted, i.e. B<-newkey rsa> specified, |
+the default key size, specified in the configuration file is used. |
+All other algorithms support the B<-newkey alg:file> form, where file may be |
+an algorithm parameter file, created by the B<genpkey -genparam> command |
+or and X.509 certificate for a key with approriate algorithm. |
+ |
+B<param:file> generates a key using the parameter file or certificate B<file>, |
+the algorithm is determined by the parameters. B<algname:file> use algorithm |
+B<algname> and parameter file B<file>: the two algorithms must match or an |
+error occurs. B<algname> just uses algorithm B<algname>, and parameters, |
+if neccessary should be specified via B<-pkeyopt> parameter. |
+ |
+B<dsa:filename> generates a DSA key using the parameters |
+in the file B<filename>. B<ec:filename> generates EC key (usable both with |
+ECDSA or ECDH algorithms), B<gost2001:filename> generates GOST R |
+34.10-2001 key (requires B<ccgost> engine configured in the configuration |
+file). If just B<gost2001> is specified a parameter set should be |
+specified by B<-pkeyopt paramset:X> |
+ |
+ |
+=item B<-pkeyopt opt:value> |
+ |
+set the public key algorithm option B<opt> to B<value>. The precise set of |
+options supported depends on the public key algorithm used and its |
+implementation. See B<KEY GENERATION OPTIONS> in the B<genpkey> manual page |
+for more details. |
+ |
=item B<-key filename> |
This specifies the file to read the private key from. It also |
@@ -155,12 +197,16 @@ |
if this option is specified then if a private key is created it |
will not be encrypted. |
-=item B<-[md5|sha1|md2|mdc2]> |
+=item B<-[digest]> |
-this specifies the message digest to sign the request with. This |
-overrides the digest algorithm specified in the configuration file. |
-This option is ignored for DSA requests: they always use SHA1. |
+this specifies the message digest to sign the request with (such as |
+B<-md5>, B<-sha1>). This overrides the digest algorithm specified in |
+the configuration file. |
+Some public key algorithms may override this choice. For instance, DSA |
+signatures always use SHA1, GOST R 34.10 signatures always use |
+GOST R 34.11-94 (B<-md_gost94>). |
+ |
=item B<-config filename> |
this allows an alternative configuration file to be specified, |
@@ -227,6 +273,15 @@ |
commas. Alternatively the B<-nameopt> switch may be used more than once to |
set multiple options. See the L<x509(1)|x509(1)> manual page for details. |
+=item B<-reqopt> |
+ |
+customise the output format used with B<-text>. The B<option> argument can be |
+a single option or multiple options separated by commas. |
+ |
+See discission of the B<-certopt> parameter in the L<B<x509>|x509(1)> |
+command. |
+ |
+ |
=item B<-asn1-kludge> |
by default the B<req> command outputs certificate requests containing |
@@ -242,6 +297,10 @@ |
It should be noted that very few CAs still require the use of this option. |
+=item B<-no-asn1-kludge> |
+ |
+Reverses effect of B<-asn1-kludge> |
+ |
=item B<-newhdr> |
Adds the word B<NEW> to the PEM file header and footer lines on the outputed |
@@ -257,11 +316,16 @@ |
=item B<-engine id> |
-specifying an engine (by it's unique B<id> string) will cause B<req> |
+specifying an engine (by its unique B<id> string) will cause B<req> |
to attempt to obtain a functional reference to the specified engine, |
thus initialising it if needed. The engine will then be set as the default |
for all available algorithms. |
+=item B<-keygen_engine id> |
+ |
+specifies an engine (by its unique B<id> string) which would be used |
+for key generation operations. |
+ |
=back |
=head1 CONFIGURATION FILE FORMAT |
@@ -344,7 +408,9 @@ |
this specifies the configuration file section containing a list of |
extensions to add to the certificate request. It can be overridden |
-by the B<-reqexts> command line switch. |
+by the B<-reqexts> command line switch. See the |
+L<x509v3_config(5)|x509v3_config(5)> manual page for details of the |
+extension section format. |
=item B<x509_extensions> |
@@ -606,6 +672,7 @@ |
=head1 SEE ALSO |
L<x509(1)|x509(1)>, L<ca(1)|ca(1)>, L<genrsa(1)|genrsa(1)>, |
-L<gendsa(1)|gendsa(1)>, L<config(5)|config(5)> |
+L<gendsa(1)|gendsa(1)>, L<config(5)|config(5)>, |
+L<x509v3_config(5)|x509v3_config(5)> |
=cut |