openssl man page on DigitalUNIX

Man page or keyword search:  
man Server   12896 pages
apropos Keyword Search (all sections)
Output format
DigitalUNIX logo
[printable version]

openssl(1ssl)							 openssl(1ssl)

NAME
       openssl - OpenSSL command line tool

SYNOPSIS
       openssl command [command_opts] [command_args] [] [] [] [] [] []

       openssl	[list-standard-commands	 | list-message-digest-commands| list-
       cipher-commands]

       openssl no-XXX [arbitrary options]

COMMAND SUMMARY
       The openssl program provides a rich variety of commands, each of	 which
       often has a wealth of options and arguments.

       The  pseudo-commands  list-standard-commands,  list-message-digest-com‐
       mands, and list-cipher-commands output a list (one entry per  line)  of
       the  names of all standard commands, message digest commands, or cipher
       commands, respectively, that are available in the present openssl util‐
       ity.

       The pseudo-command no-XXX tests whether a command of the specified name
       is available.  If no command named XXX exists, it returns  0  (success)
       and  prints  no-XXX;  otherwise	it  returns 1 and prints XXX.  In both
       cases, the output goes to stdout and  nothing  is  printed  to  stderr.
       Additional  command  line arguments are always ignored.	Since for each
       cipher there is a command of the same name, this provides an  easy  way
       for  shell  scripts  to	test  for  the	availability of ciphers in the
       openssl program. (The no-XXX command is not able to detect  pseudo-com‐
       mands such as quit, list- ...-commands, or no-XXX itself.)

   STANDARD COMMANDS
       Parse  an  ASN.1	 sequence.   Certificate  Authority  (CA)  Management.
       Cipher Suite Description Determination.	 Certificate  Revocation  List
       (CRL)  Management.   CRL to PKCS#7 Conversion.  Message Digest Calcula‐
       tion.  Diffie-Hellman Parameter Management. Obsoleted by dhparam.   DSA
       Data  Management.   DSA	Parameter  Generation.	Encoding with Ciphers.
       Error Number to Error String Conversion.	 Generation and Management  of
       Diffie-Hellman  Parameters.   Generation	 of Diffie-Hellman Parameters.
       Obsoleted by dhparam.  Generation of DSA Parameters.  Generation of RSA
       Parameters.   Generation of hashed passwords.  PKCS#12 Data Management.
       PKCS#7 Data Management.	Generate pseudo-random bytes.  X.509  Certifi‐
       cate Signing Request (CSR) Management.  RSA Data Management.  RSA util‐
       ity for signing, verification, encryption, and decryption.   Implements
       a  generic  SSL/TLS client which can establish a transparent connection
       to a remote server speaking SSL/TLS. It is intended  for	 testing  pur‐
       poses  only  and	 provides only rudimentary interface functionality but
       internally uses mostly all functionality of the	OpenSSL	 ssl  library.
       This implements a generic SSL/TLS server which accepts connections from
       remote clients speaking SSL/TLS. It is intended	for  testing  purposes
       only  and  provides only rudimentary interface functionality but inter‐
       nally uses mostly all functionality of the  OpenSSL  ssl	 library.   It
       provides	 both  an  own	command line oriented protocol for testing SSL
       functions and a simple HTTP response facility to	 emulate  an  SSL/TLS-
       aware  webserver.   SSL Connection Timer.  SSL Session Data Management.
       S/MIME mail processing.	Algorithm Speed Measurement.   X.509  Certifi‐
       cate  Verification.   OpenSSL  Version  Information.  X.509 Certificate
       Data Management.

   MESSAGE DIGEST COMMANDS
       MD2 Digest MD5 Digest MDC2  Digest  RMD-160  Digest  SHA	 Digest	 SHA-1
       Digest

   ENCODING AND CIPHER COMMANDS
       Base64  Encoding	 Blowfish  Cipher  CAST Cipher CAST5 Cipher DES Cipher
       Triple-DES Cipher IDEA Cipher RC2 Cipher RC4 Cipher RC5 Cipher

   PASSWORD PHRASE ARGUMENTS
       Several commands accept password arguments, typically using the -passin
       and  the	 -passout options for input and output passwords respectively.
       These allow the password to be obtained from a variety of sources. Both
       of  these  options  take	 a  single  argument whose format is described
       below. If no password argument is given and a password is required then
       the user is prompted to enter one. This will typically be read from the
       current terminal with echoing turned off.  The actual password is pass‐
       word.  Since  the  password  is	visible to utilities (such as ps under
       UNIX), this form should only be used where security is  not  important.
       Obtains the password from the environment variable var. Since the envi‐
       ronment of other processes is visible on certain	 platforms  (e.g.   ps
       under  certain UNIX operating systems), this option should be used with
       caution.	 The first line of pathname is the password. If the same path‐
       name  argument  is  supplied to -passin and -passout arguments then the
       first line will be used for the input password and the  next  line  for
       the  output password. The pathname need not refer to a regular file. It
       could, for example, refer to a device or named pipe.  Reads  the	 pass‐
       word from the file descriptor number. This can be used, for example, to
       send the data via a pipe.  Reads the password from standard input.

DESCRIPTION
       OpenSSL is a cryptography toolkit implementing the Secure Sockets Layer
       (SSL v2/v3) and Transport Layer Security (TLS v1) network protocols and
       related cryptography standards required by them.

       The openssl program is a command line tool for using the various	 cryp‐
       tography	 functions of OpenSSL's crypto library from the shell.	It can
       be used for the following: Creation of RSA, DH and DSA  key  parameters
       Creation	 of  X.509  certificates, CSRs and CRLs Calculation of Message
       Digests Encryption and  Decryption  with	 Ciphers  SSL/TLS  Client  and
       Server Tests Handling of S/MIME signed or encrypted mail

HISTORY
       The openssl(1ssl) document appeared in OpenSSL 0.9.2. The list-XXX-com‐
       mands pseudo-commands were added in OpenSSL 0.9.3. The  no-XXX  pseudo-
       commands were added in OpenSSL 0.9.5a. For notes on the availability of
       other commands, see their individual manual pages.

SEE ALSO
       Commands:  asn1parse(1ssl),   ca(1ssl),	 crl(1ssl),   crl2pkcs7(1ssl),
       dgst(1ssl),   dhparam(1ssl),   dsa(1ssl),   dsaparam(1ssl),   enc(1sl),
       gendsa(1ssl), genrsa(1ssl),  nseq(1ssl),	 openssl(1ssl),	 passwd(1ssl),
       pkcs12(1ssl),	pkcs7(1ssl),   pkcs8(1ssl),   rand(1ssl),   req(1ssl),
       rsa(1ssl), rsautl(1ssl), s_client(1ssl),	 s_server(1ssl),  smime(1ssl),
       spkac(1ssl), verify(1ssl), version(1ssl), x509(1ssl)

       Functions: crypto(3), ssl(3)

       Others: config(5)

								 openssl(1ssl)
[top]

List of man pages available for DigitalUNIX

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net