openssl.pod 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885
  1. =pod
  2. =head1 NAME
  3. openssl - OpenSSL command line program
  4. =head1 SYNOPSIS
  5. B<openssl>
  6. I<command>
  7. [ I<options> ... ]
  8. [ I<parameters> ... ]
  9. B<openssl> B<no->I<XXX> [ I<options> ]
  10. B<openssl> B<-help> | B<-version>
  11. =head1 DESCRIPTION
  12. OpenSSL is a cryptography toolkit implementing the Secure Sockets Layer (SSL)
  13. and Transport Layer Security (TLS) network protocols and related
  14. cryptography standards required by them.
  15. The B<openssl> program is a command line program for using the various
  16. cryptography functions of OpenSSL's B<crypto> library from the shell.
  17. It can be used for
  18. o Creation and management of private keys, public keys and parameters
  19. o Public key cryptographic operations
  20. o Creation of X.509 certificates, CSRs and CRLs
  21. o Calculation of Message Digests and Message Authentication Codes
  22. o Encryption and Decryption with Ciphers
  23. o SSL/TLS Client and Server Tests
  24. o Handling of S/MIME signed or encrypted mail
  25. o Timestamp requests, generation and verification
  26. =head1 COMMAND SUMMARY
  27. The B<openssl> program provides a rich variety of commands (I<command> in
  28. the L</SYNOPSIS> above).
  29. Each command can have many options and argument parameters, shown above as
  30. I<options> and I<parameters>.
  31. Detailed documentation and use cases for most standard subcommands are available
  32. (e.g., L<openssl-x509(1)>). The subcommand L<openssl-list(1)> may be used to list
  33. subcommands.
  34. The command B<no->I<XXX> tests whether a command of the
  35. specified name is available. If no command named I<XXX> exists, it
  36. returns 0 (success) and prints B<no->I<XXX>; otherwise it returns 1
  37. and prints I<XXX>. In both cases, the output goes to B<stdout> and
  38. nothing is printed to B<stderr>. Additional command line arguments
  39. are always ignored. Since for each cipher there is a command of the
  40. same name, this provides an easy way for shell scripts to test for the
  41. availability of ciphers in the B<openssl> program. (B<no->I<XXX> is
  42. not able to detect pseudo-commands such as B<quit>,
  43. B<list>, or B<no->I<XXX> itself.)
  44. =head2 Configuration Option
  45. Many commands use an external configuration file for some or all of their
  46. arguments and have a B<-config> option to specify that file.
  47. The default name of the file is F<openssl.cnf> in the default certificate
  48. storage area, which can be determined from the L<openssl-version(1)>
  49. command using the B<-d> or B<-a> option.
  50. The environment variable B<OPENSSL_CONF> can be used to specify a different
  51. file location or to disable loading a configuration (using the empty string).
  52. Among others, the configuration file can be used to load modules
  53. and to specify parameters for generating certificates and random numbers.
  54. See L<config(5)> for details.
  55. =head2 Standard Commands
  56. =over 4
  57. =item B<asn1parse>
  58. Parse an ASN.1 sequence.
  59. =item B<ca>
  60. Certificate Authority (CA) Management.
  61. =item B<ciphers>
  62. Cipher Suite Description Determination.
  63. =item B<cms>
  64. CMS (Cryptographic Message Syntax) command.
  65. =item B<crl>
  66. Certificate Revocation List (CRL) Management.
  67. =item B<crl2pkcs7>
  68. CRL to PKCS#7 Conversion.
  69. =item B<dgst>
  70. Message Digest calculation. MAC calculations are superseded by
  71. L<openssl-mac(1)>.
  72. =item B<dhparam>
  73. Generation and Management of Diffie-Hellman Parameters. Superseded by
  74. L<openssl-genpkey(1)> and L<openssl-pkeyparam(1)>.
  75. =item B<dsa>
  76. DSA Data Management.
  77. =item B<dsaparam>
  78. DSA Parameter Generation and Management. Superseded by
  79. L<openssl-genpkey(1)> and L<openssl-pkeyparam(1)>.
  80. =item B<ec>
  81. EC (Elliptic curve) key processing.
  82. =item B<ecparam>
  83. EC parameter manipulation and generation.
  84. =item B<enc>
  85. Encryption, decryption, and encoding.
  86. =item B<engine>
  87. Engine (loadable module) information and manipulation.
  88. =item B<errstr>
  89. Error Number to Error String Conversion.
  90. =item B<fipsinstall>
  91. FIPS configuration installation.
  92. =item B<gendsa>
  93. Generation of DSA Private Key from Parameters. Superseded by
  94. L<openssl-genpkey(1)> and L<openssl-pkey(1)>.
  95. =item B<genpkey>
  96. Generation of Private Key or Parameters.
  97. =item B<genrsa>
  98. Generation of RSA Private Key. Superseded by L<openssl-genpkey(1)>.
  99. =item B<help>
  100. Display information about a command's options.
  101. =item B<info>
  102. Display diverse information built into the OpenSSL libraries.
  103. =item B<kdf>
  104. Key Derivation Functions.
  105. =item B<list>
  106. List algorithms and features.
  107. =item B<mac>
  108. Message Authentication Code Calculation.
  109. =item B<nseq>
  110. Create or examine a Netscape certificate sequence.
  111. =item B<ocsp>
  112. Online Certificate Status Protocol command.
  113. =item B<passwd>
  114. Generation of hashed passwords.
  115. =item B<pkcs12>
  116. PKCS#12 Data Management.
  117. =item B<pkcs7>
  118. PKCS#7 Data Management.
  119. =item B<pkcs8>
  120. PKCS#8 format private key conversion command.
  121. =item B<pkey>
  122. Public and private key management.
  123. =item B<pkeyparam>
  124. Public key algorithm parameter management.
  125. =item B<pkeyutl>
  126. Public key algorithm cryptographic operation command.
  127. =item B<prime>
  128. Compute prime numbers.
  129. =item B<rand>
  130. Generate pseudo-random bytes.
  131. =item B<rehash>
  132. Create symbolic links to certificate and CRL files named by the hash values.
  133. =item B<req>
  134. PKCS#10 X.509 Certificate Signing Request (CSR) Management.
  135. =item B<rsa>
  136. RSA key management.
  137. =item B<rsautl>
  138. RSA command for signing, verification, encryption, and decryption. Superseded
  139. by L<openssl-pkeyutl(1)>.
  140. =item B<s_client>
  141. This implements a generic SSL/TLS client which can establish a transparent
  142. connection to a remote server speaking SSL/TLS. It's intended for testing
  143. purposes only and provides only rudimentary interface functionality but
  144. internally uses mostly all functionality of the OpenSSL B<ssl> library.
  145. =item B<s_server>
  146. This implements a generic SSL/TLS server which accepts connections from remote
  147. clients speaking SSL/TLS. It's intended for testing purposes only and provides
  148. only rudimentary interface functionality but internally uses mostly all
  149. functionality of the OpenSSL B<ssl> library. It provides both an own command
  150. line oriented protocol for testing SSL functions and a simple HTTP response
  151. facility to emulate an SSL/TLS-aware webserver.
  152. =item B<s_time>
  153. SSL Connection Timer.
  154. =item B<sess_id>
  155. SSL Session Data Management.
  156. =item B<smime>
  157. S/MIME mail processing.
  158. =item B<speed>
  159. Algorithm Speed Measurement.
  160. =item B<spkac>
  161. SPKAC printing and generating command.
  162. =item B<srp>
  163. Maintain SRP password file. This command is deprecated.
  164. =item B<storeutl>
  165. Command to list and display certificates, keys, CRLs, etc.
  166. =item B<ts>
  167. Time Stamping Authority command.
  168. =item B<verify>
  169. X.509 Certificate Verification.
  170. See also the L<openssl-verification-options(1)> manual page.
  171. =item B<version>
  172. OpenSSL Version Information.
  173. =item B<x509>
  174. X.509 Certificate Data Management.
  175. =back
  176. =head2 Message Digest Commands
  177. =over 4
  178. =item B<blake2b512>
  179. BLAKE2b-512 Digest
  180. =item B<blake2s256>
  181. BLAKE2s-256 Digest
  182. =item B<md2>
  183. MD2 Digest
  184. =item B<md4>
  185. MD4 Digest
  186. =item B<md5>
  187. MD5 Digest
  188. =item B<mdc2>
  189. MDC2 Digest
  190. =item B<rmd160>
  191. RMD-160 Digest
  192. =item B<sha1>
  193. SHA-1 Digest
  194. =item B<sha224>
  195. SHA-2 224 Digest
  196. =item B<sha256>
  197. SHA-2 256 Digest
  198. =item B<sha384>
  199. SHA-2 384 Digest
  200. =item B<sha512>
  201. SHA-2 512 Digest
  202. =item B<sha3-224>
  203. SHA-3 224 Digest
  204. =item B<sha3-256>
  205. SHA-3 256 Digest
  206. =item B<sha3-384>
  207. SHA-3 384 Digest
  208. =item B<sha3-512>
  209. SHA-3 512 Digest
  210. =item B<keccak-224>
  211. KECCAK 224 Digest
  212. =item B<keccak-256>
  213. KECCAK 256 Digest
  214. =item B<keccak-384>
  215. KECCAK 384 Digest
  216. =item B<keccak-512>
  217. KECCAK 512 Digest
  218. =item B<shake128>
  219. SHA-3 SHAKE128 Digest
  220. =item B<shake256>
  221. SHA-3 SHAKE256 Digest
  222. =item B<sm3>
  223. SM3 Digest
  224. =back
  225. =head2 Encryption, Decryption, and Encoding Commands
  226. The following aliases provide convenient access to the most used encodings
  227. and ciphers.
  228. Depending on how OpenSSL was configured and built, not all ciphers listed
  229. here may be present. See L<openssl-enc(1)> for more information.
  230. =over 4
  231. =item B<aes128>, B<aes-128-cbc>, B<aes-128-cfb>, B<aes-128-ctr>, B<aes-128-ecb>, B<aes-128-ofb>
  232. AES-128 Cipher
  233. =item B<aes192>, B<aes-192-cbc>, B<aes-192-cfb>, B<aes-192-ctr>, B<aes-192-ecb>, B<aes-192-ofb>
  234. AES-192 Cipher
  235. =item B<aes256>, B<aes-256-cbc>, B<aes-256-cfb>, B<aes-256-ctr>, B<aes-256-ecb>, B<aes-256-ofb>
  236. AES-256 Cipher
  237. =item B<aria128>, B<aria-128-cbc>, B<aria-128-cfb>, B<aria-128-ctr>, B<aria-128-ecb>, B<aria-128-ofb>
  238. Aria-128 Cipher
  239. =item B<aria192>, B<aria-192-cbc>, B<aria-192-cfb>, B<aria-192-ctr>, B<aria-192-ecb>, B<aria-192-ofb>
  240. Aria-192 Cipher
  241. =item B<aria256>, B<aria-256-cbc>, B<aria-256-cfb>, B<aria-256-ctr>, B<aria-256-ecb>, B<aria-256-ofb>
  242. Aria-256 Cipher
  243. =item B<base64>
  244. Base64 Encoding
  245. =item B<bf>, B<bf-cbc>, B<bf-cfb>, B<bf-ecb>, B<bf-ofb>
  246. Blowfish Cipher
  247. =item B<camellia128>, B<camellia-128-cbc>, B<camellia-128-cfb>, B<camellia-128-ctr>, B<camellia-128-ecb>, B<camellia-128-ofb>
  248. Camellia-128 Cipher
  249. =item B<camellia192>, B<camellia-192-cbc>, B<camellia-192-cfb>, B<camellia-192-ctr>, B<camellia-192-ecb>, B<camellia-192-ofb>
  250. Camellia-192 Cipher
  251. =item B<camellia256>, B<camellia-256-cbc>, B<camellia-256-cfb>, B<camellia-256-ctr>, B<camellia-256-ecb>, B<camellia-256-ofb>
  252. Camellia-256 Cipher
  253. =item B<cast>, B<cast-cbc>
  254. CAST Cipher
  255. =item B<cast5-cbc>, B<cast5-cfb>, B<cast5-ecb>, B<cast5-ofb>
  256. CAST5 Cipher
  257. =item B<chacha20>
  258. Chacha20 Cipher
  259. =item B<des>, B<des-cbc>, B<des-cfb>, B<des-ecb>, B<des-ede>, B<des-ede-cbc>, B<des-ede-cfb>, B<des-ede-ofb>, B<des-ofb>
  260. DES Cipher
  261. =item B<des3>, B<desx>, B<des-ede3>, B<des-ede3-cbc>, B<des-ede3-cfb>, B<des-ede3-ofb>
  262. Triple-DES Cipher
  263. =item B<idea>, B<idea-cbc>, B<idea-cfb>, B<idea-ecb>, B<idea-ofb>
  264. IDEA Cipher
  265. =item B<rc2>, B<rc2-cbc>, B<rc2-cfb>, B<rc2-ecb>, B<rc2-ofb>
  266. RC2 Cipher
  267. =item B<rc4>
  268. RC4 Cipher
  269. =item B<rc5>, B<rc5-cbc>, B<rc5-cfb>, B<rc5-ecb>, B<rc5-ofb>
  270. RC5 Cipher
  271. =item B<seed>, B<seed-cbc>, B<seed-cfb>, B<seed-ecb>, B<seed-ofb>
  272. SEED Cipher
  273. =item B<sm4>, B<sm4-cbc>, B<sm4-cfb>, B<sm4-ctr>, B<sm4-ecb>, B<sm4-ofb>
  274. SM4 Cipher
  275. =back
  276. =head1 OPTIONS
  277. Details of which options are available depend on the specific command.
  278. This section describes some common options with common behavior.
  279. =head2 Program Options
  280. These options can be specified without a command specified to get help
  281. or version information.
  282. =over 4
  283. =item B<-help>
  284. Provides a terse summary of all options.
  285. For more detailed information, each command supports a B<-help> option.
  286. Accepts B<--help> as well.
  287. =item B<-version>
  288. Provides a terse summary of the B<openssl> program version.
  289. For more detailed information see L<openssl-version(1)>.
  290. Accepts B<--version> as well.
  291. =back
  292. =head2 Common Options
  293. =over 4
  294. =item B<-help>
  295. If an option takes an argument, the "type" of argument is also given.
  296. =item B<-->
  297. This terminates the list of options. It is mostly useful if any filename
  298. parameters start with a minus sign:
  299. openssl verify [flags...] -- -cert1.pem...
  300. =back
  301. =head2 Format Options
  302. See L<openssl-format-options(1)> for manual page.
  303. =head2 Pass Phrase Options
  304. See the L<openssl-passphrase-options(1)> manual page.
  305. =head2 Random State Options
  306. Prior to OpenSSL 1.1.1, it was common for applications to store information
  307. about the state of the random-number generator in a file that was loaded
  308. at startup and rewritten upon exit. On modern operating systems, this is
  309. generally no longer necessary as OpenSSL will seed itself from a trusted
  310. entropy source provided by the operating system. These flags are still
  311. supported for special platforms or circumstances that might require them.
  312. It is generally an error to use the same seed file more than once and
  313. every use of B<-rand> should be paired with B<-writerand>.
  314. =over 4
  315. =item B<-rand> I<files>
  316. A file or files containing random data used to seed the random number
  317. generator.
  318. Multiple files can be specified separated by an OS-dependent character.
  319. The separator is C<;> for MS-Windows, C<,> for OpenVMS, and C<:> for
  320. all others. Another way to specify multiple files is to repeat this flag
  321. with different filenames.
  322. =item B<-writerand> I<file>
  323. Writes the seed data to the specified I<file> upon exit.
  324. This file can be used in a subsequent command invocation.
  325. =back
  326. =head2 Certificate Verification Options
  327. See the L<openssl-verification-options(1)> manual page.
  328. =head2 Name Format Options
  329. See the L<openssl-namedisplay-options(1)> manual page.
  330. =head2 TLS Version Options
  331. Several commands use SSL, TLS, or DTLS. By default, the commands use TLS and
  332. clients will offer the lowest and highest protocol version they support,
  333. and servers will pick the highest version that the client offers that is also
  334. supported by the server.
  335. The options below can be used to limit which protocol versions are used,
  336. and whether TCP (SSL and TLS) or UDP (DTLS) is used.
  337. Note that not all protocols and flags may be available, depending on how
  338. OpenSSL was built.
  339. =over 4
  340. =item B<-ssl3>, B<-tls1>, B<-tls1_1>, B<-tls1_2>, B<-tls1_3>, B<-no_ssl3>, B<-no_tls1>, B<-no_tls1_1>, B<-no_tls1_2>, B<-no_tls1_3>
  341. These options require or disable the use of the specified SSL or TLS protocols.
  342. When a specific TLS version is required, only that version will be offered or
  343. accepted.
  344. Only one specific protocol can be given and it cannot be combined with any of
  345. the B<no_> options.
  346. The B<no_*> options do not work with B<s_time> and B<ciphers> commands but work with
  347. B<s_client> and B<s_server> commands.
  348. =item B<-dtls>, B<-dtls1>, B<-dtls1_2>
  349. These options specify to use DTLS instead of TLS.
  350. With B<-dtls>, clients will negotiate any supported DTLS protocol version.
  351. Use the B<-dtls1> or B<-dtls1_2> options to support only DTLS1.0 or DTLS1.2,
  352. respectively.
  353. =back
  354. =head2 Engine Options
  355. =over 4
  356. =item B<-engine> I<id>
  357. Load the engine identified by I<id> and use all the methods it implements
  358. (algorithms, key storage, etc.), unless specified otherwise in the
  359. command-specific documentation or it is configured to do so, as described in
  360. L<config(5)/Engine Configuration>.
  361. The engine will be used for key ids specified with B<-key> and similar
  362. options when an option like B<-keyform engine> is given.
  363. A special case is the C<loader_attic> engine, which
  364. is meant just for internal OpenSSL testing purposes and
  365. supports loading keys, parameters, certificates, and CRLs from files.
  366. When this engine is used, files with such credentials are read via this engine.
  367. Using the C<file:> schema is optional; a plain file (path) name will do.
  368. =back
  369. Options specifying keys, like B<-key> and similar, can use the generic
  370. OpenSSL engine key loading URI scheme C<org.openssl.engine:> to retrieve
  371. private keys and public keys. The URI syntax is as follows, in simplified
  372. form:
  373. org.openssl.engine:{engineid}:{keyid}
  374. Where C<{engineid}> is the identity/name of the engine, and C<{keyid}> is a
  375. key identifier that's acceptable by that engine. For example, when using an
  376. engine that interfaces against a PKCS#11 implementation, the generic key URI
  377. would be something like this (this happens to be an example for the PKCS#11
  378. engine that's part of OpenSC):
  379. -key org.openssl.engine:pkcs11:label_some-private-key
  380. As a third possibility, for engines and providers that have implemented
  381. their own L<OSSL_STORE_LOADER(3)>, C<org.openssl.engine:> should not be
  382. necessary. For a PKCS#11 implementation that has implemented such a loader,
  383. the PKCS#11 URI as defined in RFC 7512 should be possible to use directly:
  384. -key pkcs11:object=some-private-key;pin-value=1234
  385. =head2 Provider Options
  386. =over 4
  387. =item B<-provider> I<name>
  388. Load and initialize the provider identified by I<name>. The I<name>
  389. can be also a path to the provider module. In that case the provider name
  390. will be the specified path and not just the provider module name.
  391. Interpretation of relative paths is platform specific. The configured
  392. "MODULESDIR" path, B<OPENSSL_MODULES> environment variable, or the path
  393. specified by B<-provider-path> is prepended to relative paths.
  394. See L<provider(7)> for a more detailed description.
  395. =item B<-provider-path> I<path>
  396. Specifies the search path that is to be used for looking for providers.
  397. Equivalently, the B<OPENSSL_MODULES> environment variable may be set.
  398. =item B<-propquery> I<propq>
  399. Specifies the I<property query clause> to be used when fetching algorithms
  400. from the loaded providers.
  401. See L<property(7)> for a more detailed description.
  402. =back
  403. =head1 ENVIRONMENT
  404. The OpenSSL library can be take some configuration parameters from the
  405. environment. Some of these variables are listed below. For information
  406. about specific commands, see L<openssl-engine(1)>,
  407. L<openssl-rehash(1)>, and L<tsget(1)>.
  408. For information about the use of environment variables in configuration,
  409. see L<config(5)/ENVIRONMENT>.
  410. For information about querying or specifying CPU architecture flags, see
  411. L<OPENSSL_ia32cap(3)>, L<OPENSSL_s390xcap(3)> and L<OPENSSL_riscvcap(3)>.
  412. For information about all environment variables used by the OpenSSL libraries,
  413. see L<openssl-env(7)>.
  414. =over 4
  415. =item B<OPENSSL_TRACE=>I<name>[,...]
  416. Enable tracing output of OpenSSL library, by name.
  417. This output will only make sense if you know OpenSSL internals well.
  418. Also, it might not give you any output at all
  419. if OpenSSL was built without tracing support.
  420. The value is a comma separated list of names, with the following
  421. available:
  422. =over 4
  423. =item B<TRACE>
  424. Traces the OpenSSL trace API itself.
  425. =item B<INIT>
  426. Traces OpenSSL library initialization and cleanup.
  427. =item B<TLS>
  428. Traces the TLS/SSL protocol.
  429. =item B<TLS_CIPHER>
  430. Traces the ciphers used by the TLS/SSL protocol.
  431. =item B<CONF>
  432. Show details about provider and engine configuration.
  433. =item B<ENGINE_TABLE>
  434. The function that is used by RSA, DSA (etc) code to select registered
  435. ENGINEs, cache defaults and functional references (etc), will generate
  436. debugging summaries.
  437. =item B<ENGINE_REF_COUNT>
  438. Reference counts in the ENGINE structure will be monitored with a line
  439. of generated for each change.
  440. =item B<PKCS5V2>
  441. Traces PKCS#5 v2 key generation.
  442. =item B<PKCS12_KEYGEN>
  443. Traces PKCS#12 key generation.
  444. =item B<PKCS12_DECRYPT>
  445. Traces PKCS#12 decryption.
  446. =item B<X509V3_POLICY>
  447. Generates the complete policy tree at various points during X.509 v3
  448. policy evaluation.
  449. =item B<BN_CTX>
  450. Traces BIGNUM context operations.
  451. =item B<CMP>
  452. Traces CMP client and server activity.
  453. =item B<STORE>
  454. Traces STORE operations.
  455. =item B<DECODER>
  456. Traces decoder operations.
  457. =item B<ENCODER>
  458. Traces encoder operations.
  459. =item B<REF_COUNT>
  460. Traces decrementing certain ASN.1 structure references.
  461. =item B<HTTP>
  462. Traces the HTTP client and server, such as messages being sent and received.
  463. =back
  464. =back
  465. =head1 SEE ALSO
  466. L<openssl-asn1parse(1)>,
  467. L<openssl-ca(1)>,
  468. L<openssl-ciphers(1)>,
  469. L<openssl-cms(1)>,
  470. L<openssl-crl(1)>,
  471. L<openssl-crl2pkcs7(1)>,
  472. L<openssl-dgst(1)>,
  473. L<openssl-dhparam(1)>,
  474. L<openssl-dsa(1)>,
  475. L<openssl-dsaparam(1)>,
  476. L<openssl-ec(1)>,
  477. L<openssl-ecparam(1)>,
  478. L<openssl-enc(1)>,
  479. L<openssl-engine(1)>,
  480. L<openssl-errstr(1)>,
  481. L<openssl-gendsa(1)>,
  482. L<openssl-genpkey(1)>,
  483. L<openssl-genrsa(1)>,
  484. L<openssl-kdf(1)>,
  485. L<openssl-list(1)>,
  486. L<openssl-mac(1)>,
  487. L<openssl-nseq(1)>,
  488. L<openssl-ocsp(1)>,
  489. L<openssl-passwd(1)>,
  490. L<openssl-pkcs12(1)>,
  491. L<openssl-pkcs7(1)>,
  492. L<openssl-pkcs8(1)>,
  493. L<openssl-pkey(1)>,
  494. L<openssl-pkeyparam(1)>,
  495. L<openssl-pkeyutl(1)>,
  496. L<openssl-prime(1)>,
  497. L<openssl-rand(1)>,
  498. L<openssl-rehash(1)>,
  499. L<openssl-req(1)>,
  500. L<openssl-rsa(1)>,
  501. L<openssl-rsautl(1)>,
  502. L<openssl-s_client(1)>,
  503. L<openssl-s_server(1)>,
  504. L<openssl-s_time(1)>,
  505. L<openssl-sess_id(1)>,
  506. L<openssl-smime(1)>,
  507. L<openssl-speed(1)>,
  508. L<openssl-spkac(1)>,
  509. L<openssl-srp(1)>,
  510. L<openssl-storeutl(1)>,
  511. L<openssl-ts(1)>,
  512. L<openssl-verify(1)>,
  513. L<openssl-version(1)>,
  514. L<openssl-x509(1)>,
  515. L<config(5)>,
  516. L<crypto(7)>,
  517. L<openssl-env(7)>.
  518. L<ssl(7)>,
  519. L<x509v3_config(5)>
  520. =head1 HISTORY
  521. The B<list> -I<XXX>B<-algorithms> options were added in OpenSSL 1.0.0;
  522. For notes on the availability of other commands, see their individual
  523. manual pages.
  524. The B<-issuer_checks> option is deprecated as of OpenSSL 1.1.0 and
  525. is silently ignored.
  526. The B<-xcertform> and B<-xkeyform> options
  527. are obsolete since OpenSSL 3.0 and have no effect.
  528. The interactive mode, which could be invoked by running C<openssl>
  529. with no further arguments, was removed in OpenSSL 3.0, and running
  530. that program with no arguments is now equivalent to C<openssl help>.
  531. =head1 COPYRIGHT
  532. Copyright 2000-2023 The OpenSSL Project Authors. All Rights Reserved.
  533. Licensed under the Apache License 2.0 (the "License"). You may not use
  534. this file except in compliance with the License. You can obtain a copy
  535. in the file LICENSE in the source distribution or at
  536. L<https://www.openssl.org/source/license.html>.
  537. =cut