123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856 |
- =pod
- {- OpenSSL::safe::output_do_not_edit_headers(); -}
- =head1 NAME
- openssl-x509 - Certificate display and signing command
- =head1 SYNOPSIS
- B<openssl> B<x509>
- [B<-help>]
- [B<-inform> B<DER>|B<PEM>]
- [B<-outform> B<DER>|B<PEM>]
- [B<-keyform> B<DER>|B<PEM>|B<P12>|B<ENGINE>]
- [B<-CAform> B<DER>|B<PEM>|B<P12>]
- [B<-CAkeyform> B<DER>|B<PEM>|B<P12>|B<ENGINE>]
- [B<-in> I<filename>]
- [B<-out> I<filename>]
- [B<-serial>]
- [B<-hash>]
- [B<-subject_hash>]
- [B<-subject_hash_old>]
- [B<-issuer_hash>]
- [B<-issuer_hash_old>]
- [B<-ocspid>]
- [B<-subject>]
- [B<-issuer>]
- [B<-email>]
- [B<-ocsp_uri>]
- [B<-startdate>]
- [B<-enddate>]
- [B<-purpose>]
- [B<-dates>]
- [B<-checkend> I<num>]
- [B<-modulus>]
- [B<-pubkey>]
- [B<-fingerprint>]
- [B<-alias>]
- [B<-noout>]
- [B<-trustout>]
- [B<-clrtrust>]
- [B<-clrreject>]
- [B<-addtrust> I<arg>]
- [B<-addreject> I<arg>]
- [B<-setalias> I<arg>]
- [B<-days> I<arg>]
- [B<-set_serial> I<n>]
- [B<-signkey> I<arg>]
- [B<-badsig>]
- [B<-passin> I<arg>]
- [B<-x509toreq>]
- [B<-req>]
- [B<-CA> I<filename>]
- [B<-CAkey> I<filename>]
- [B<-CAcreateserial>]
- [B<-CAserial> I<filename>]
- [B<-new>]
- [B<-next_serial>]
- [B<-nocert>]
- [B<-force_pubkey> I<filename>]
- [B<-subj> I<arg>]
- [B<-text>]
- [B<-ext> I<extensions>]
- [B<-certopt> I<option>]
- [B<-checkhost> I<host>]
- [B<-checkemail> I<host>]
- [B<-checkip> I<ipaddr>]
- [B<-C>]
- [B<-I<digest>>]
- [B<-clrext>]
- [B<-extfile> I<filename>]
- [B<-extensions> I<section>]
- [B<-sigopt> I<nm>:I<v>]
- [B<-vfyopt> I<nm>:I<v>]
- [B<-preserve_dates>]
- {- $OpenSSL::safe::opt_name_synopsis -}
- {- $OpenSSL::safe::opt_r_synopsis -}
- {- $OpenSSL::safe::opt_engine_synopsis -}
- {- $OpenSSL::safe::opt_provider_synopsis -}
- =for openssl ifdef engine subject_hash_old issuer_hash_old
- =head1 DESCRIPTION
- This command is a multi-purposes certificate command. It can
- be used to display certificate information, convert certificates to
- various forms, sign certificate requests like a "mini CA" or edit
- certificate trust settings.
- Since there are a large number of options they will split up into
- various sections.
- =head1 OPTIONS
- =head2 Input, Output, and General Purpose Options
- =over 4
- =item B<-help>
- Print out a usage message.
- =item B<-inform> B<DER>|B<PEM>
- The CSR input format; the default is B<PEM>.
- See L<openssl(1)/Format Options> for details.
- The input is normally an X.509 certificate file of any format,
- but this can change if other options such as B<-req> are used.
- B<-outform> B<DER>|B<PEM>
- The output format; the default is B<PEM>.
- See L<openssl(1)/Format Options> for details.
- =item B<-in> I<filename>
- This specifies the input filename to read a certificate from or standard input
- if this option is not specified.
- =item B<-out> I<filename>
- This specifies the output filename to write to or standard output by
- default.
- =item B<-I<digest>>
- The digest to use.
- This affects any signing or display option that uses a message
- digest, such as the B<-fingerprint>, B<-signkey> and B<-CA> options.
- Any digest supported by the L<openssl-dgst(1)> command can be used.
- If not specified then SHA1 is used with B<-fingerprint> or
- the default digest for the signing algorithm is used, typically SHA256.
- =item B<-preserve_dates>
- When signing a certificate, preserve the "notBefore" and "notAfter" dates
- instead of adjusting them to current time and duration.
- Cannot be used with the B<-days> option.
- {- $OpenSSL::safe::opt_r_synopsis -}
- {- $OpenSSL::safe::opt_engine_item -}
- {- $OpenSSL::safe::opt_provider_item -}
- =back
- =head2 Display Options
- Note: the B<-alias> and B<-purpose> options are also display options
- but are described in the L</Trust Settings> section.
- =over 4
- =item B<-text>
- Prints out the certificate in text form. Full details are output including the
- public key, signature algorithms, issuer and subject names, serial number
- any extensions present and any trust settings.
- =item B<-ext> I<extensions>
- Prints out the certificate extensions in text form. Extensions are specified
- with a comma separated string, e.g., "subjectAltName,subjectKeyIdentifier".
- See the L<x509v3_config(5)> manual page for the extension names.
- =item B<-certopt> I<option>
- Customise the output format used with B<-text>. The I<option> argument
- can be a single option or multiple options separated by commas. The
- B<-certopt> switch may be also be used more than once to set multiple
- options. See the L</Text Options> section for more information.
- =item B<-checkhost> I<host>
- Check that the certificate matches the specified host.
- =item B<-checkemail> I<email>
- Check that the certificate matches the specified email address.
- =item B<-checkip> I<ipaddr>
- Check that the certificate matches the specified IP address.
- =item B<-noout>
- This option prevents output of the encoded version of the certificate.
- =item B<-pubkey>
- Outputs the certificate's SubjectPublicKeyInfo block in PEM format.
- =item B<-modulus>
- This option prints out the value of the modulus of the public key
- contained in the certificate.
- =item B<-serial>
- Outputs the certificate serial number.
- =item B<-subject_hash>
- Outputs the "hash" of the certificate subject name. This is used in OpenSSL to
- form an index to allow certificates in a directory to be looked up by subject
- name.
- =item B<-issuer_hash>
- Outputs the "hash" of the certificate issuer name.
- =item B<-ocspid>
- Outputs the OCSP hash values for the subject name and public key.
- =item B<-hash>
- Synonym for "-subject_hash" for backward compatibility reasons.
- =item B<-subject_hash_old>
- Outputs the "hash" of the certificate subject name using the older algorithm
- as used by OpenSSL before version 1.0.0.
- =item B<-issuer_hash_old>
- Outputs the "hash" of the certificate issuer name using the older algorithm
- as used by OpenSSL before version 1.0.0.
- =item B<-subject>
- Outputs the subject name.
- =item B<-issuer>
- Outputs the issuer name.
- {- $OpenSSL::safe::opt_name_item -}
- =item B<-email>
- Outputs the email address(es) if any.
- =item B<-ocsp_uri>
- Outputs the OCSP responder address(es) if any.
- =item B<-startdate>
- Prints out the start date of the certificate, that is the notBefore date.
- =item B<-enddate>
- Prints out the expiry date of the certificate, that is the notAfter date.
- =item B<-dates>
- Prints out the start and expiry dates of a certificate.
- =item B<-checkend> I<arg>
- Checks if the certificate expires within the next I<arg> seconds and exits
- nonzero if yes it will expire or zero if not.
- =item B<-fingerprint>
- Calculates and outputs the digest of the DER encoded version of the entire
- certificate (see digest options).
- This is commonly called a "fingerprint". Because of the nature of message
- digests, the fingerprint of a certificate is unique to that certificate and
- two certificates with the same fingerprint can be considered to be the same.
- =item B<-C>
- This outputs the certificate in the form of a C source file.
- =back
- =head2 Trust Settings
- A B<trusted certificate> is an ordinary certificate which has several
- additional pieces of information attached to it such as the permitted
- and prohibited uses of the certificate and an "alias".
- Normally when a certificate is being verified at least one certificate
- must be "trusted". By default a trusted certificate must be stored
- locally and must be a root CA: any certificate chain ending in this CA
- is then usable for any purpose.
- Trust settings currently are only used with a root CA. They allow a finer
- control over the purposes the root CA can be used for. For example a CA
- may be trusted for SSL client but not SSL server use.
- See the description in L<openssl-verify(1)> for more information
- on the meaning of trust settings.
- Future versions of OpenSSL will recognize trust settings on any
- certificate: not just root CAs.
- =over 4
- =item B<-trustout>
- Output a B<trusted> certificate rather than an ordinary. An ordinary
- or trusted certificate can be input but by default an ordinary
- certificate is output and any trust settings are discarded. With the
- B<-trustout> option a trusted certificate is output. A trusted
- certificate is automatically output if any trust settings are modified.
- =item B<-setalias> I<arg>
- Sets the alias of the certificate. This will allow the certificate
- to be referred to using a nickname for example "Steve's Certificate".
- =item B<-alias>
- Outputs the certificate alias, if any.
- =item B<-clrtrust>
- Clears all the permitted or trusted uses of the certificate.
- =item B<-clrreject>
- Clears all the prohibited or rejected uses of the certificate.
- =item B<-addtrust> I<arg>
- Adds a trusted certificate use.
- Any object name can be used here but currently only B<clientAuth> (SSL client
- use), B<serverAuth> (SSL server use), B<emailProtection> (S/MIME email) and
- B<anyExtendedKeyUsage> are used.
- As of OpenSSL 1.1.0, the last of these blocks all purposes when rejected or
- enables all purposes when trusted.
- Other OpenSSL applications may define additional uses.
- =item B<-addreject> I<arg>
- Adds a prohibited use. It accepts the same values as the B<-addtrust>
- option.
- =item B<-purpose>
- This option performs tests on the certificate extensions and outputs
- the results. For a more complete description see the
- L</CERTIFICATE EXTENSIONS> section.
- =back
- =head2 Signing Options
- This command can be used to sign certificates and requests: it
- can thus behave like a "mini CA".
- =over 4
- =item B<-signkey> I<arg>
- This option causes the input file to be self signed using the supplied
- private key or engine.
- It sets the issuer name to the subject name (i.e., makes it self-issued)
- and changes the public key to the supplied value (unless overridden by
- B<-force_pubkey>). It sets the validity start date to the current time
- and the end date to a value determined by the B<-days> option.
- It retains any certificate extensions unless the B<-clrext> option is supplied;
- this includes, for example, any existing key identifier extensions.
- =item B<-badsig>
- Corrupt the signature before writing it; this can be useful
- for testing.
- =item B<-sigopt> I<nm>:I<v>
- Pass options to the signature algorithm during sign operations.
- Names and values of these options are algorithm-specific.
- =item B<-vfyopt> I<nm>:I<v>
- Pass options to the signature algorithm during verify operations.
- Names and values of these options are algorithm-specific.
- =item B<-passin> I<arg>
- The key and certificate file password source.
- For more information about the format of I<arg>
- see L<openssl(1)/Pass Phrase Options>.
- =item B<-clrext>
- Delete any extensions from a certificate. This option is used when a
- certificate is being created from another certificate (for example with
- the B<-signkey> or the B<-CA> options). Normally all extensions are
- retained.
- =item B<-keyform> B<DER>|B<PEM>|B<P12>|B<ENGINE>
- The key format; the default is B<PEM>.
- The only value with effect is B<ENGINE>; all others have become obsolete.
- See L<openssl(1)/Format Options> for details.
- =item B<-CAform> B<DER>|B<PEM>|B<P12>,
- The format for the CA certificate.
- This option has no effect and is retained for backward compatibility.
- =item B<-CAkeyform> B<DER>|B<PEM>|B<P12>|B<ENGINE>
- The format for the CA key; the default is B<PEM>.
- The only value with effect is B<ENGINE>; all others have become obsolete.
- See L<openssl(1)/Format Options> for details.
- =item B<-days> I<arg>
- Specifies the number of days to make a certificate valid for. The default
- is 30 days. Cannot be used with the B<-preserve_dates> option.
- =item B<-x509toreq>
- Converts a certificate into a certificate request. The B<-signkey> option
- is used to pass the required private key.
- =item B<-req>
- By default a certificate is expected on input. With this option a
- certificate request is expected instead.
- =item B<-set_serial> I<n>
- Specifies the serial number to use. This option can be used with either
- the B<-signkey> or B<-CA> options. If used in conjunction with the B<-CA>
- option the serial number file (as specified by the B<-CAserial> or
- B<-CAcreateserial> options) is not used.
- The serial number can be decimal or hex (if preceded by C<0x>).
- =item B<-CA> I<filename>
- Specifies the CA certificate to be used for signing. When this option is
- present, this command behaves like a "mini CA". The input file is signed by
- this CA using this option: that is its issuer name is set to the subject name
- of the CA and it is digitally signed using the CAs private key.
- This option is normally combined with the B<-req> option. Without the
- B<-req> option the input is a certificate which must be self signed.
- =item B<-CAkey> I<filename>
- Sets the CA private key to sign a certificate with. If this option is
- not specified then it is assumed that the CA private key is present in
- the CA certificate file.
- =item B<-CAserial> I<filename>
- Sets the CA serial number file to use.
- When the B<-CA> option is used to sign a certificate it uses a serial
- number specified in a file. This file consists of one line containing
- an even number of hex digits with the serial number to use. After each
- use the serial number is incremented and written out to the file again.
- The default filename consists of the CA certificate file base name with
- F<.srl> appended. For example if the CA certificate file is called
- F<mycacert.pem> it expects to find a serial number file called
- F<mycacert.srl>.
- =item B<-CAcreateserial>
- With this option the CA serial number file is created if it does not exist:
- it will contain the serial number "02" and the certificate being signed will
- have the 1 as its serial number. If the B<-CA> option is specified
- and the serial number file does not exist a random number is generated;
- this is the recommended practice.
- =item B<-extfile> I<filename>
- File containing certificate extensions to use. If not specified then
- no extensions are added to the certificate.
- =item B<-extensions> I<section>
- The section to add certificate extensions from. If this option is not
- specified then the extensions should either be contained in the unnamed
- (default) section or the default section should contain a variable called
- "extensions" which contains the section to use. See the
- L<x509v3_config(5)> manual page for details of the
- extension section format.
- =item B<-new>
- Generate a certificate from scratch, not using an input certificate
- or certificate request. So the B<-in> option must not be used in this case.
- Instead, the B<-subj> and <-force_pubkey> options need to be given.
- =item B<-next_serial>
- Set the serial to be one more than the number in the certificate.
- =item B<-nocert>
- Do not generate or output a certificate.
- =item B<-force_pubkey> I<filename>
- When a certificate is created set its public key to the key in I<filename>
- instead of the key contained in the input or given with the B<-signkey> option.
- This option is useful for creating self-issued certificates that are not
- self-signed, for instance when the key cannot be used for signing, such as DH.
- It can also be used in conjunction with b<-new> and B<-subj> to directly
- generate a certificate containing any desired public key.
- =item B<-subj> I<arg>
- When a certificate is created set its subject name to the given value.
- The arg must be formatted as C</type0=value0/type1=value1/type2=...>.
- Special characters may be escaped by C<\> (backslash), whitespace is retained.
- Empty values are permitted, but the corresponding type will not be included
- in the certificate.
- Giving a single C</> will lead to an empty sequence of RDNs (a NULL-DN).
- Multi-valued RDNs can be formed by placing a C<+> character instead of a C</>
- between the AttributeValueAssertions (AVAs) that specify the members of the set.
- Example:
- C</DC=org/DC=OpenSSL/DC=users/UID=123456+CN=John Doe>
- Unless the B<-CA> option is given the issuer is set to the same value.
- This option can be used in conjunction with the B<-force_pubkey> option
- to create a certificate even without providing an input certificate
- or certificate request.
- =back
- =head2 Text Options
- As well as customising the name output format, it is also possible to
- customise the actual fields printed using the B<certopt> options when
- the B<text> option is present. The default behaviour is to print all fields.
- =over 4
- =item B<compatible>
- Use the old format. This is equivalent to specifying no output options at all.
- =item B<no_header>
- Don't print header information: that is the lines saying "Certificate"
- and "Data".
- =item B<no_version>
- Don't print out the version number.
- =item B<no_serial>
- Don't print out the serial number.
- =item B<no_signame>
- Don't print out the signature algorithm used.
- =item B<no_validity>
- Don't print the validity, that is the B<notBefore> and B<notAfter> fields.
- =item B<no_subject>
- Don't print out the subject name.
- =item B<no_issuer>
- Don't print out the issuer name.
- =item B<no_pubkey>
- Don't print out the public key.
- =item B<no_sigdump>
- Don't give a hexadecimal dump of the certificate signature.
- =item B<no_aux>
- Don't print out certificate trust information.
- =item B<no_extensions>
- Don't print out any X509V3 extensions.
- =item B<ext_default>
- Retain default extension behaviour: attempt to print out unsupported
- certificate extensions.
- =item B<ext_error>
- Print an error message for unsupported certificate extensions.
- =item B<ext_parse>
- ASN1 parse unsupported extensions.
- =item B<ext_dump>
- Hex dump unsupported extensions.
- =item B<ca_default>
- The value used by L<openssl-ca(1)>, equivalent to B<no_issuer>, B<no_pubkey>,
- B<no_header>, and B<no_version>.
- =back
- =head1 EXAMPLES
- Note: in these examples the '\' means the example should be all on one
- line.
- Display the contents of a certificate:
- openssl x509 -in cert.pem -noout -text
- Display the "Subject Alternative Name" extension of a certificate:
- openssl x509 -in cert.pem -noout -ext subjectAltName
- Display more extensions of a certificate:
- openssl x509 -in cert.pem -noout -ext subjectAltName,nsCertType
- Display the certificate serial number:
- openssl x509 -in cert.pem -noout -serial
- Display the certificate subject name:
- openssl x509 -in cert.pem -noout -subject
- Display the certificate subject name in RFC2253 form:
- openssl x509 -in cert.pem -noout -subject -nameopt RFC2253
- Display the certificate subject name in oneline form on a terminal
- supporting UTF8:
- openssl x509 -in cert.pem -noout -subject -nameopt oneline,-esc_msb
- Display the certificate SHA1 fingerprint:
- openssl x509 -sha1 -in cert.pem -noout -fingerprint
- Convert a certificate from PEM to DER format:
- openssl x509 -in cert.pem -inform PEM -out cert.der -outform DER
- Convert a certificate to a certificate request:
- openssl x509 -x509toreq -in cert.pem -out req.pem -signkey key.pem
- Convert a certificate request into a self signed certificate using
- extensions for a CA:
- openssl x509 -req -in careq.pem -extfile openssl.cnf -extensions v3_ca \
- -signkey key.pem -out cacert.pem
- Sign a certificate request using the CA certificate above and add user
- certificate extensions:
- openssl x509 -req -in req.pem -extfile openssl.cnf -extensions v3_usr \
- -CA cacert.pem -CAkey key.pem -CAcreateserial
- Set a certificate to be trusted for SSL client use and change set its alias to
- "Steve's Class 1 CA"
- openssl x509 -in cert.pem -addtrust clientAuth \
- -setalias "Steve's Class 1 CA" -out trust.pem
- =head1 NOTES
- The conversion to UTF8 format used with the name options assumes that
- T61Strings use the ISO8859-1 character set. This is wrong but Netscape
- and MSIE do this as do many certificates. So although this is incorrect
- it is more likely to display the majority of certificates correctly.
- The B<-email> option searches the subject name and the subject alternative
- name extension. Only unique email addresses will be printed out: it will
- not print the same address more than once.
- =head1 CERTIFICATE EXTENSIONS
- The B<-purpose> option checks the certificate extensions and determines
- what the certificate can be used for. The actual checks done are rather
- complex and include various hacks and workarounds to handle broken
- certificates and software.
- The same code is used when verifying untrusted certificates in chains
- so this section is useful if a chain is rejected by the verify code.
- The basicConstraints extension CA flag is used to determine whether the
- certificate can be used as a CA. If the CA flag is true then it is a CA,
- if the CA flag is false then it is not a CA. B<All> CAs should have the
- CA flag set to true.
- If the basicConstraints extension is absent then the certificate is
- considered to be a "possible CA" other extensions are checked according
- to the intended use of the certificate. A warning is given in this case
- because the certificate should really not be regarded as a CA: however
- it is allowed to be a CA to work around some broken software.
- If the certificate is a V1 certificate (and thus has no extensions) and
- it is self signed it is also assumed to be a CA but a warning is again
- given: this is to work around the problem of Verisign roots which are V1
- self signed certificates.
- If the keyUsage extension is present then additional restraints are
- made on the uses of the certificate. A CA certificate B<must> have the
- keyCertSign bit set if the keyUsage extension is present.
- The extended key usage extension places additional restrictions on the
- certificate uses. If this extension is present (whether critical or not)
- the key can only be used for the purposes specified.
- A complete description of each test is given below. The comments about
- basicConstraints and keyUsage and V1 certificates above apply to B<all>
- CA certificates.
- =over 4
- =item B<SSL Client>
- The extended key usage extension must be absent or include the "web client
- authentication" OID. keyUsage must be absent or it must have the
- digitalSignature bit set. Netscape certificate type must be absent or it must
- have the SSL client bit set.
- =item B<SSL Client CA>
- The extended key usage extension must be absent or include the "web client
- authentication" OID. Netscape certificate type must be absent or it must have
- the SSL CA bit set: this is used as a work around if the basicConstraints
- extension is absent.
- =item B<SSL Server>
- The extended key usage extension must be absent or include the "web server
- authentication" and/or one of the SGC OIDs. keyUsage must be absent or it
- must have the digitalSignature, the keyEncipherment set or both bits set.
- Netscape certificate type must be absent or have the SSL server bit set.
- =item B<SSL Server CA>
- The extended key usage extension must be absent or include the "web server
- authentication" and/or one of the SGC OIDs. Netscape certificate type must
- be absent or the SSL CA bit must be set: this is used as a work around if the
- basicConstraints extension is absent.
- =item B<Netscape SSL Server>
- For Netscape SSL clients to connect to an SSL server it must have the
- keyEncipherment bit set if the keyUsage extension is present. This isn't
- always valid because some cipher suites use the key for digital signing.
- Otherwise it is the same as a normal SSL server.
- =item B<Common S/MIME Client Tests>
- The extended key usage extension must be absent or include the "email
- protection" OID. Netscape certificate type must be absent or should have the
- S/MIME bit set. If the S/MIME bit is not set in Netscape certificate type
- then the SSL client bit is tolerated as an alternative but a warning is shown:
- this is because some Verisign certificates don't set the S/MIME bit.
- =item B<S/MIME Signing>
- In addition to the common S/MIME client tests the digitalSignature bit or
- the nonRepudiation bit must be set if the keyUsage extension is present.
- =item B<S/MIME Encryption>
- In addition to the common S/MIME tests the keyEncipherment bit must be set
- if the keyUsage extension is present.
- =item B<S/MIME CA>
- The extended key usage extension must be absent or include the "email
- protection" OID. Netscape certificate type must be absent or must have the
- S/MIME CA bit set: this is used as a work around if the basicConstraints
- extension is absent.
- =item B<CRL Signing>
- The keyUsage extension must be absent or it must have the CRL signing bit
- set.
- =item B<CRL Signing CA>
- The normal CA tests apply. Except in this case the basicConstraints extension
- must be present.
- =back
- =head1 BUGS
- Extensions in certificates are not transferred to certificate requests and
- vice versa.
- It is possible to produce invalid certificates or requests by specifying the
- wrong private key or using inconsistent options in some cases: these should
- be checked.
- There should be options to explicitly set such things as start and end
- dates rather than an offset from the current time.
- =head1 SEE ALSO
- L<openssl(1)>,
- L<openssl-req(1)>,
- L<openssl-ca(1)>,
- L<openssl-genrsa(1)>,
- L<openssl-gendsa(1)>,
- L<openssl-verify(1)>,
- L<x509v3_config(5)>
- =head1 HISTORY
- The hash algorithm used in the B<-subject_hash> and B<-issuer_hash> options
- before OpenSSL 1.0.0 was based on the deprecated MD5 algorithm and the encoding
- of the distinguished name. In OpenSSL 1.0.0 and later it is based on a canonical
- version of the DN using SHA1. This means that any directories using the old
- form must have their links rebuilt using L<openssl-rehash(1)> or similar.
- All B<-keyform> and B<-CAkeyform> values except B<ENGINE>
- have become obsolete in OpenSSL 3.0.0 and have no effect.
- The B<-CAform> option has become obsolete in OpenSSL 3.0.0 and has no effect.
- The B<-engine> option was deprecated in OpenSSL 3.0.
- =head1 COPYRIGHT
- Copyright 2000-2020 The OpenSSL Project Authors. All Rights Reserved.
- Licensed under the Apache License 2.0 (the "License"). You may not use
- this file except in compliance with the License. You can obtain a copy
- in the file LICENSE in the source distribution or at
- L<https://www.openssl.org/source/license.html>.
- =cut
|