| Index: openssl/doc/apps/pkcs12.pod
|
| ===================================================================
|
| --- openssl/doc/apps/pkcs12.pod (revision 105093)
|
| +++ openssl/doc/apps/pkcs12.pod (working copy)
|
| @@ -23,22 +23,23 @@
|
| [B<-cacerts>]
|
| [B<-nokeys>]
|
| [B<-info>]
|
| -[B<-des>]
|
| -[B<-des3>]
|
| -[B<-idea>]
|
| -[B<-nodes>]
|
| +[B<-des | -des3 | -idea | -aes128 | -aes192 | -aes256 | -camellia128 | -camellia192 | -camellia256 | -nodes>]
|
| [B<-noiter>]
|
| -[B<-maciter>]
|
| +[B<-maciter | -nomaciter | -nomac>]
|
| [B<-twopass>]
|
| [B<-descert>]
|
| -[B<-certpbe>]
|
| -[B<-keypbe>]
|
| +[B<-certpbe cipher>]
|
| +[B<-keypbe cipher>]
|
| +[B<-macalg digest>]
|
| [B<-keyex>]
|
| [B<-keysig>]
|
| [B<-password arg>]
|
| [B<-passin arg>]
|
| [B<-passout arg>]
|
| [B<-rand file(s)>]
|
| +[B<-CAfile file>]
|
| +[B<-CApath dir>]
|
| +[B<-CSP name>]
|
|
|
| =head1 DESCRIPTION
|
|
|
| @@ -49,7 +50,7 @@
|
| =head1 COMMAND OPTIONS
|
|
|
| There are a lot of options the meaning of some depends of whether a PKCS#12 file
|
| -is being created or parsed. By default a PKCS#12 file is parsed a PKCS#12
|
| +is being created or parsed. By default a PKCS#12 file is parsed. A PKCS#12
|
| file can be created by using the B<-export> option (see below).
|
|
|
| =head1 PARSING OPTIONS
|
| @@ -63,25 +64,25 @@
|
|
|
| =item B<-out filename>
|
|
|
| -The filename to write certificates and private keys to, standard output by default.
|
| -They are all written in PEM format.
|
| +The filename to write certificates and private keys to, standard output by
|
| +default. They are all written in PEM format.
|
|
|
| =item B<-pass arg>, B<-passin arg>
|
|
|
| -the PKCS#12 file (i.e. input file) password source. For more information about the
|
| -format of B<arg> see the B<PASS PHRASE ARGUMENTS> section in
|
| +the PKCS#12 file (i.e. input file) password source. For more information about
|
| +the format of B<arg> see the B<PASS PHRASE ARGUMENTS> section in
|
| L<openssl(1)|openssl(1)>.
|
|
|
| =item B<-passout arg>
|
|
|
| -pass phrase source to encrypt any outputed private keys with. For more information
|
| -about the format of B<arg> see the B<PASS PHRASE ARGUMENTS> section in
|
| -L<openssl(1)|openssl(1)>.
|
| +pass phrase source to encrypt any outputed private keys with. For more
|
| +information about the format of B<arg> see the B<PASS PHRASE ARGUMENTS> section
|
| +in L<openssl(1)|openssl(1)>.
|
|
|
| =item B<-noout>
|
|
|
| -this option inhibits output of the keys and certificates to the output file version
|
| -of the PKCS#12 file.
|
| +this option inhibits output of the keys and certificates to the output file
|
| +version of the PKCS#12 file.
|
|
|
| =item B<-clcerts>
|
|
|
| @@ -116,6 +117,14 @@
|
|
|
| use IDEA to encrypt private keys before outputting.
|
|
|
| +=item B<-aes128>, B<-aes192>, B<-aes256>
|
| +
|
| +use AES to encrypt private keys before outputting.
|
| +
|
| +=item B<-camellia128>, B<-camellia192>, B<-camellia256>
|
| +
|
| +use Camellia to encrypt private keys before outputting.
|
| +
|
| =item B<-nodes>
|
|
|
| don't encrypt the private keys at all.
|
| @@ -148,10 +157,10 @@
|
|
|
| =item B<-in filename>
|
|
|
| -The filename to read certificates and private keys from, standard input by default.
|
| -They must all be in PEM format. The order doesn't matter but one private key and
|
| -its corresponding certificate should be present. If additional certificates are
|
| -present they will also be included in the PKCS#12 file.
|
| +The filename to read certificates and private keys from, standard input by
|
| +default. They must all be in PEM format. The order doesn't matter but one
|
| +private key and its corresponding certificate should be present. If additional
|
| +certificates are present they will also be included in the PKCS#12 file.
|
|
|
| =item B<-inkey filename>
|
|
|
| @@ -160,8 +169,8 @@
|
|
|
| =item B<-name friendlyname>
|
|
|
| -This specifies the "friendly name" for the certificate and private key. This name
|
| -is typically displayed in list boxes by software importing the file.
|
| +This specifies the "friendly name" for the certificate and private key. This
|
| +name is typically displayed in list boxes by software importing the file.
|
|
|
| =item B<-certfile filename>
|
|
|
| @@ -201,9 +210,11 @@
|
| =item B<-keypbe alg>, B<-certpbe alg>
|
|
|
| these options allow the algorithm used to encrypt the private key and
|
| -certificates to be selected. Although any PKCS#5 v1.5 or PKCS#12 algorithms
|
| -can be selected it is advisable only to use PKCS#12 algorithms. See the list
|
| -in the B<NOTES> section for more information.
|
| +certificates to be selected. Any PKCS#5 v1.5 or PKCS#12 PBE algorithm name
|
| +can be used (see B<NOTES> section for more information). If a a cipher name
|
| +(as output by the B<list-cipher-algorithms> command is specified then it
|
| +is used with PKCS#5 v2.0. For interoperability reasons it is advisable to only
|
| +use PKCS#12 algorithms.
|
|
|
| =item B<-keyex|-keysig>
|
|
|
| @@ -216,6 +227,10 @@
|
| authentication, however due to a bug only MSIE 5.0 and later support
|
| the use of signing only keys for SSL client authentication.
|
|
|
| +=item B<-macalg digest>
|
| +
|
| +specify the MAC digest algorithm. If not included them SHA1 will be used.
|
| +
|
| =item B<-nomaciter>, B<-noiter>
|
|
|
| these options affect the iteration counts on the MAC and key algorithms.
|
| @@ -239,6 +254,10 @@
|
| This option is included for compatibility with previous versions, it used
|
| to be needed to use MAC iterations counts but they are now used by default.
|
|
|
| +=item B<-nomac>
|
| +
|
| +don't attempt to provide the MAC integrity.
|
| +
|
| =item B<-rand file(s)>
|
|
|
| a file or files containing random data used to seed the random number
|
| @@ -247,6 +266,20 @@
|
| The separator is B<;> for MS-Windows, B<,> for OpenVMS, and B<:> for
|
| all others.
|
|
|
| +=item B<-CAfile file>
|
| +
|
| +CA storage as a file.
|
| +
|
| +=item B<-CApath dir>
|
| +
|
| +CA storage as a directory. This directory must be a standard certificate
|
| +directory: that is a hash of each subject name (using B<x509 -hash>) should be
|
| +linked to each certificate.
|
| +
|
| +=item B<-CSP name>
|
| +
|
| +write B<name> as a Microsoft CSP name.
|
| +
|
| =back
|
|
|
| =head1 NOTES
|
|
|