aboutsummaryrefslogtreecommitdiffstats
path: root/doc/apps
Commit message (Collapse)AuthorAgeFilesLines
* Move manpages to man[1357] structure.Rich Salz2016-10-2649-14461/+0
| | | | | | | | | | Move manpages to manX directories Add Windows/VMS install fix from Richard Levitte Update README Fix typo's Remove some duplicates Reviewed-by: Richard Levitte <levitte@openssl.org>
* Add Postgres support to -starttlsValentin Vidic2016-10-171-1/+1
| | | | | Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Tim Hudson <tjh@openssl.org>
* Add -item option to asn1parseDr. Stephen Henson2016-09-291-0/+6
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* Dcoument -alpn flagRich Salz2016-09-212-4/+14
| | | | Reviewed-by: Richard Levitte <levitte@openssl.org>
* Make reference to other manpage more explicitRich Salz2016-09-142-3/+5
| | | | | | Where -curves, etc., are defined: SSL_CONF_cmd Reviewed-by: Andy Polyakov <appro@openssl.org>
* Document the new SHA256 and SHA512 password generation optionsRichard Levitte2016-09-141-0/+9
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* Add -h and -help for c_rehash script and appRich Salz2016-09-141-1/+2
| | | | | | Resolves GH1515 and GH1509. Reviewed-by: Matt Caswell <matt@openssl.org>
* crypto/pkcs12: facilitate accessing data with non-interoperable password.Andy Polyakov2016-08-221-0/+10
| | | | | | | | | | | Originally PKCS#12 subroutines treated password strings as ASCII. It worked as long as they were pure ASCII, but if there were some none-ASCII characters result was non-interoperable. But fixing it poses problem accessing data protected with broken password. In order to make asscess to old data possible add retry with old-style password. Reviewed-by: Richard Levitte <levitte@openssl.org>
* Add -dane_ee_no_namechecks s_client(1) optionViktor Dukhovni2016-08-191-0/+19
| | | | | | | | The DANE API supports a DANE_FLAG_NO_DANE_EE_NAMECHECKS option, but there was no way to exercise/enable it via s_client. This commit addresses that gap. Reviewed-by: Rich Salz <rsalz@openssl.org>
* RT3940: For now, just document the issue.Rich Salz2016-08-192-0/+6
| | | | Reviewed-by: Richard Levitte <levitte@openssl.org>
* add documentationDr. Stephen Henson2016-08-132-0/+12
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>
* Fix doc and help about ca -valid optionFdaSilvaYY2016-08-111-0/+5
| | | | | Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org>
* spelling fixes, just comments and readme.klemens2016-08-054-4/+4
| | | | | Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/1413)
* Various doc fixes.Rich Salz2016-07-282-25/+84
| | | | | | | | Cannot nest B<> tags Document "openssl speed" command. Fix doc nits: missing NAME/SYNOPSIS stuff Reviewed-by: Tim Hudson <tjh@openssl.org>
* RT4593: Add space after comma (doc nits)Rich Salz2016-07-192-2/+2
| | | | | | | Update find-doc-nits to find errors in SYNOPSIS (the most common place where they were missing). Reviewed-by: Matt Caswell <matt@openssl.org>
* Add -ciphers flag to enc commandRich Salz2016-06-241-0/+5
| | | | | | Don't print the full list of ciphers as part of the -help output. Reviewed-by: Andy Polyakov <appro@openssl.org>
* Spelling... and more spellingFdaSilvaYY2016-06-221-1/+1
| | | | | Reviewed-by: Kurt Roeckx <kurt@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/1245)
* Allow proxy certs to be present when verifying a chainRichard Levitte2016-06-201-1/+11
| | | | | Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Stephen Henson <steve@openssl.org>
* Spelling fixesFdaSilvaYY2016-06-162-2/+2
| | | | | Reviewed-by: Kurt Roeckx <kurt@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/1219)
* RT3809: basicConstraints is criticalRich Salz2016-06-131-1/+1
| | | | | | | This is really a security bugfix, not enhancement any more. Everyone knows critical extensions. Reviewed-by: Dr. Stephen Henson <steve@openssl.org>
* Fix some typos in pod filesFdaSilvaYY2016-06-0811-20/+20
| | | | | Reviewed-by: Matt Caswell <matt@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org> (Merged from https://github.com/openssl/openssl/pull/1189)
* More doc nitsRich Salz2016-06-064-4/+4
| | | | | | | Update script to look for period or POD markup in NAME section, and fix them. Reviewed-by: Andy Polyakov <appro@openssl.org>
* Fix documentation error in x509 app certopt flagMatt Caswell2016-06-031-2/+2
| | | | | | | | | | | | | | | | | According to the x509 man page in the section discussing -certopt it says that the ca_default option is the same as that used by the ca utility and (amongst other things) has the effect of suppressing printing of the signature - but in fact it doesn't. This error seems to have been present since the documentation was written back in 2001. It never had this effect. The default config file sets the certopt value to ca_default. The ca utility takes that and THEN adds additional options to suppress printing of the signature. So the ca utility DOES suppress printing of the signature - but it is not as a result of using the ca_default option. GitHub Issue #247 Reviewed-by: Rich Salz <rsalz@openssl.org>
* Fix various doc nits.Rich Salz2016-06-016-67/+93
| | | | Reviewed-by: Richard Levitte <levitte@openssl.org>
* Add dhparam sanity check and update DH_check documentationMatt Caswell2016-06-011-1/+2
| | | | | | | | | | | | | The -check argument to dhparam should never identify any problems if we have just generated the parameters. Add a sanity check for this and print an error and fail if necessary. Also updates the documentation for the -check argument, and the DH_check() function. RT#4244 Reviewed-by: Richard Levitte <levitte@openssl.org>
* RT4539: Add section for renamed ciphers.Rich Salz2016-05-311-0/+7
| | | | Reviewed-by: Richard Levitte <levitte@openssl.org>
* Support for traditional format private keys.Dr. Stephen Henson2016-05-232-24/+57
| | | | | | | | Add new function PEM_write_bio_PrivateKey_traditional() to enforce the use of legacy "traditional" private key format. Add -traditional option to pkcs8 and pkey utilities. Reviewed-by: Matt Caswell <matt@openssl.org>
* Doc nits cleanup, round 2Rich Salz2016-05-2048-183/+84
| | | | | | | | | | | Fix some code examples, trailing whitespace Fix TBA sections in verify, remove others. Remove empty sections Use Mixed Case not ALL CAPS in head2 Enhance doc-nits script. Remove extra =cut line Reviewed-by: Richard Levitte <levitte@openssl.org>
* Fix nits in pod files.Rich Salz2016-05-2037-265/+251
| | | | | | | | | Add doc-nit-check to help find future issues. Make podchecker be almost clean. Remove trailing whitespace. Tab expansion Reviewed-by: Richard Levitte <levitte@openssl.org>
* Use correct EOL in headers.Dr. Stephen Henson2016-05-192-0/+13
| | | | | | RT#1817 Reviewed-by: Rich Salz <rsalz@openssl.org>
* Add copyright to manpagesRich Salz2016-05-1948-0/+528
| | | | Reviewed-by: Richard Levitte <levitte@openssl.org>
* Ensure =cut is last line in every file.Rich Salz2016-05-197-3/+7
| | | | Reviewed-by: Richard Levitte <levitte@openssl.org>
* Document the esc_2254 command line name optionRichard Levitte2016-05-181-1/+6
| | | | | | RT#1466 Reviewed-by: Rich Salz <rsalz@openssl.org>
* Correct documentation on digest used.Dr. Stephen Henson2016-05-131-3/+2
| | | | | | RT#4302 Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
* Correctly check for trailing digest options.Dr. Stephen Henson2016-05-121-15/+16
| | | | | | | | | | Multiple digest options to the ocsp utility are allowed: e.g. to use different digests for different certificate IDs. A digest option without a following certificate is however illegal. RT#4215 Reviewed-by: Rich Salz <rsalz@openssl.org>
* Update pkcs8 defaults.Dr. Stephen Henson2016-05-111-24/+22
| | | | | | | | Update pkcs8 utility to use 256 bit AES using SHA256 by default. Update documentation. Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
* Add -srp option to ciphers command.Dr. Stephen Henson2016-05-101-6/+10
| | | | | | RT#4224 Reviewed-by: Richard Levitte <levitte@openssl.org>
* Typo.Dr. Stephen Henson2016-05-101-1/+1
| | | | | | RT#4538 Reviewed-by: Matt Caswell <matt@openssl.org>
* GH875: Document -no_check_timeRich Salz2016-05-025-4/+15
| | | | | | | | | | | | Date: Tue Mar 15 15:19:44 2016 +0100 This commit updates the documentation of cms, ocsp, s_client, s_server, and verify to reflect the new "-no_check_time" option introduced in commit d35ff2c0ade0a12e84aaa2e9841b4983a2f3cf45 on 2015-07-31. Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org>
* Fix spelling in pod filesFdaSilvaYY2016-05-011-1/+1
| | | | | Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org>
* Suppress CT callback as appropriateViktor Dukhovni2016-04-071-8/+6
| | | | | | | | | | | | | | | | | | | | | | Suppress CT callbacks with aNULL or PSK ciphersuites that involve no certificates. Ditto when the certificate chain is validated via DANE-TA(2) or DANE-EE(3) TLSA records. Also skip SCT processing when the chain is fails verification. Move and consolidate CT callbacks from libcrypto to libssl. We also simplify the interface to SSL_{,CTX_}_enable_ct() which can specify either a permissive mode that just collects information or a strict mode that requires at least one valid SCT or else asks to abort the connection. Simplified SCT processing and options in s_client(1) which now has just a simple pair of "-noct" vs. "-ct" options, the latter enables the permissive callback so that we can complete the handshake and report all relevant information. When printing SCTs, print the validation status if set and not valid. Signed-off-by: Rob Percival <robpercival@google.com> Reviewed-by: Emilia Käsper <emilia@openssl.org>
* Move peer chain security checks into x509_vfy.cViktor Dukhovni2016-04-037-23/+49
| | | | | | | | | | | | | | | | | | | A new X509_VERIFY_PARAM_set_auth_level() function sets the authentication security level. For verification of SSL peers, this is automatically set from the SSL security level. Otherwise, for now, the authentication security level remains at (effectively) 0 by default. The new "-auth_level" verify(1) option is available in all the command-line tools that support the standard verify(1) options. New verify(1) tests added to check enforcement of chain signature and public key security levels. Also added new tests of enforcement of the verify_depth limit. Updated documentation. Reviewed-by: Dr. Stephen Henson <steve@openssl.org>
* Fixed languageAlex Gaynor2016-03-191-1/+1
| | | | | Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org>
* Fixed a bunch of typos in the docsAlex Gaynor2016-03-1918-24/+24
| | | | | Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org>
* General verify options to openssl tsfbroda2016-03-151-11/+51
| | | | | | | | | | | | | | This commit adds the general verify options of ocsp, verify, cms, etc. to the openssl timestamping app as suggested by Stephen N. Henson in [openssl.org #4287]. The conflicting "-policy" option of "openssl ts" has been renamed to "-tspolicy". Documentation and tests have been updated. CAVE: This will break code, which currently uses the "-policy" option. Reviewed-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Richard Levitte <levitte@openssl.org>
* Add blake2 support.Bill Cox2016-03-111-1/+1
| | | | | Reviewed-by: Andy Polyakov <appro@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org>
* Update ciphers -s documentationKurt Roeckx2016-03-091-3/+15
| | | | | | Reviewed-by: Viktor Dukhovni <viktor@openssl.org> MR: #1595
* Add documentation for new s_server/s_client optionsMatt Caswell2016-03-072-0/+52
| | | | | | Document the new split_send_frag, max_pipelines and read_buf options. Reviewed-by: Tim Hudson <tjh@openssl.org>
* Fix pkeyutl to KDF lnks.Rich Salz2016-03-071-1/+1
| | | | Reviewed-by: Viktor Dukhovni <viktor@openssl.org>
* Update documentationDr. Stephen Henson2016-03-071-23/+0
| | | | Reviewed-by: Rich Salz <rsalz@openssl.org>