5 openssl - OpenSSL command line tool
14 B<openssl> B<list> [ B<standard-commands> | B<digest-commands> | B<cipher-commands> | B<cipher-algorithms> | B<digest-algorithms> | B<public-key-algorithms>]
16 B<openssl> B<no->I<XXX> [ I<arbitrary options> ]
20 OpenSSL is a cryptography toolkit implementing the Secure Sockets Layer (SSL
21 v2/v3) and Transport Layer Security (TLS v1) network protocols and related
22 cryptography standards required by them.
24 The B<openssl> program is a command line tool for using the various
25 cryptography functions of OpenSSL's B<crypto> library from the shell.
28 o Creation and management of private keys, public keys and parameters
29 o Public key cryptographic operations
30 o Creation of X.509 certificates, CSRs and CRLs
31 o Calculation of Message Digests
32 o Encryption and Decryption with Ciphers
33 o SSL/TLS Client and Server Tests
34 o Handling of S/MIME signed or encrypted mail
35 o Time Stamp requests, generation and verification
37 =head1 COMMAND SUMMARY
39 The B<openssl> program provides a rich variety of commands (I<command> in the
40 SYNOPSIS above), each of which often has a wealth of options and arguments
41 (I<command_opts> and I<command_args> in the SYNOPSIS).
43 Many commands use an external configuration file for some or all of their
44 arguments and have a B<-config> option to specify that file.
45 The environment variable B<OPENSSL_CONF> can be used to specify
46 the location of the file.
47 If the environment variable is not specified, then the file is named
48 B<openssl.cnf> in the default certificate storage area, whose value
49 depends on the configuration flags specified when the OpenSSL
52 The list parameters B<standard-commands>, B<digest-commands>,
53 and B<cipher-commands> output a list (one entry per line) of the names
54 of all standard commands, message digest commands, or cipher commands,
55 respectively, that are available in the present B<openssl> utility.
57 The list parameters B<cipher-algorithms> and
58 B<digest-algorithms> list all cipher and message digest names, one entry per line. Aliases are listed as:
62 The list parameter B<public-key-algorithms> lists all supported public
65 The command B<no->I<XXX> tests whether a command of the
66 specified name is available. If no command named I<XXX> exists, it
67 returns 0 (success) and prints B<no->I<XXX>; otherwise it returns 1
68 and prints I<XXX>. In both cases, the output goes to B<stdout> and
69 nothing is printed to B<stderr>. Additional command line arguments
70 are always ignored. Since for each cipher there is a command of the
71 same name, this provides an easy way for shell scripts to test for the
72 availability of ciphers in the B<openssl> program. (B<no->I<XXX> is
73 not able to detect pseudo-commands such as B<quit>,
74 B<list>, or B<no->I<XXX> itself.)
76 =head2 Standard Commands
80 =item L<B<asn1parse>|asn1parse(1)>
82 Parse an ASN.1 sequence.
86 Certificate Authority (CA) Management.
88 =item L<B<ciphers>|ciphers(1)>
90 Cipher Suite Description Determination.
92 =item L<B<cms>|cms(1)>
94 CMS (Cryptographic Message Syntax) utility
96 =item L<B<crl>|crl(1)>
98 Certificate Revocation List (CRL) Management.
100 =item L<B<crl2pkcs7>|crl2pkcs7(1)>
102 CRL to PKCS#7 Conversion.
104 =item L<B<dgst>|dgst(1)>
106 Message Digest Calculation.
110 Diffie-Hellman Parameter Management.
111 Obsoleted by L<B<dhparam>|dhparam(1)>.
113 =item L<B<dhparam>|dhparam(1)>
115 Generation and Management of Diffie-Hellman Parameters. Superseded by
116 L<B<genpkey>|genpkey(1)> and L<B<pkeyparam>|pkeyparam(1)>
119 =item L<B<dsa>|dsa(1)>
123 =item L<B<dsaparam>|dsaparam(1)>
125 DSA Parameter Generation and Management. Superseded by
126 L<B<genpkey>|genpkey(1)> and L<B<pkeyparam>|pkeyparam(1)>
130 EC (Elliptic curve) key processing
132 =item L<B<ecparam>|ecparam(1)>
134 EC parameter manipulation and generation
136 =item L<B<enc>|enc(1)>
138 Encoding with Ciphers.
140 =item L<B<engine>|engine(1)>
142 Engine (loadable module) information and manipulation.
144 =item L<B<errstr>|errstr(1)>
146 Error Number to Error String Conversion.
150 Generation of Diffie-Hellman Parameters.
151 Obsoleted by L<B<dhparam>|dhparam(1)>.
153 =item L<B<gendsa>|gendsa(1)>
155 Generation of DSA Private Key from Parameters. Superseded by
156 L<B<genpkey>|genpkey(1)> and L<B<pkey>|pkey(1)>
158 =item L<B<genpkey>|genpkey(1)>
160 Generation of Private Key or Parameters.
162 =item L<B<genrsa>|genrsa(1)>
164 Generation of RSA Private Key. Superseded by L<B<genpkey>|genpkey(1)>.
166 =item L<B<nseq>|nseq(1)>
168 Create or examine a Netscape certificate sequence
170 =item L<B<ocsp>|ocsp(1)>
172 Online Certificate Status Protocol utility.
174 =item L<B<passwd>|passwd(1)>
176 Generation of hashed passwords.
178 =item L<B<pkcs12>|pkcs12(1)>
180 PKCS#12 Data Management.
182 =item L<B<pkcs7>|pkcs7(1)>
184 PKCS#7 Data Management.
186 =item L<B<pkey>|pkey(1)>
188 Public and private key management.
190 =item L<B<pkeyparam>|pkeyparam(1)>
192 Public key algorithm parameter management.
194 =item L<B<pkeyutl>|pkeyutl(1)>
196 Public key algorithm cryptographic operation utility.
198 =item L<B<rand>|rand(1)>
200 Generate pseudo-random bytes.
202 =item L<B<req>|req(1)>
204 PKCS#10 X.509 Certificate Signing Request (CSR) Management.
206 =item L<B<rsa>|rsa(1)>
211 =item L<B<rsautl>|rsautl(1)>
213 RSA utility for signing, verification, encryption, and decryption. Superseded
214 by L<B<pkeyutl>|pkeyutl(1)>
216 =item L<B<s_client>|s_client(1)>
218 This implements a generic SSL/TLS client which can establish a transparent
219 connection to a remote server speaking SSL/TLS. It's intended for testing
220 purposes only and provides only rudimentary interface functionality but
221 internally uses mostly all functionality of the OpenSSL B<ssl> library.
223 =item L<B<s_server>|s_server(1)>
225 This implements a generic SSL/TLS server which accepts connections from remote
226 clients speaking SSL/TLS. It's intended for testing purposes only and provides
227 only rudimentary interface functionality but internally uses mostly all
228 functionality of the OpenSSL B<ssl> library. It provides both an own command
229 line oriented protocol for testing SSL functions and a simple HTTP response
230 facility to emulate an SSL/TLS-aware webserver.
232 =item L<B<s_time>|s_time(1)>
234 SSL Connection Timer.
236 =item L<B<sess_id>|sess_id(1)>
238 SSL Session Data Management.
240 =item L<B<smime>|smime(1)>
242 S/MIME mail processing.
244 =item L<B<speed>|speed(1)>
246 Algorithm Speed Measurement.
248 =item L<B<spkac>|spkac(1)>
250 SPKAC printing and generating utility
254 Time Stamping Authority tool (client/server)
256 =item L<B<verify>|verify(1)>
258 X.509 Certificate Verification.
260 =item L<B<version>|version(1)>
262 OpenSSL Version Information.
264 =item L<B<x509>|x509(1)>
266 X.509 Certificate Data Management.
270 =head2 Message Digest Commands
316 =head2 Encoding and Cipher Commands
324 =item B<bf bf-cbc bf-cfb bf-ecb bf-ofb>
328 =item B<cast cast-cbc>
332 =item B<cast5-cbc cast5-cfb cast5-ecb cast5-ofb>
336 =item B<des des-cbc des-cfb des-ecb des-ede des-ede-cbc des-ede-cfb des-ede-ofb des-ofb>
340 =item B<des3 desx des-ede3 des-ede3-cbc des-ede3-cfb des-ede3-ofb>
344 =item B<idea idea-cbc idea-cfb idea-ecb idea-ofb>
348 =item B<rc2 rc2-cbc rc2-cfb rc2-ecb rc2-ofb>
356 =item B<rc5 rc5-cbc rc5-cfb rc5-ecb rc5-ofb>
364 Details of which options are available depend on the specific command.
365 This section describes some common options with common behavior.
367 =head2 Common Options
373 Provides a terse summary of all options.
377 =head2 Pass Phrase Options
379 Several commands accept password arguments, typically using B<-passin>
380 and B<-passout> for input and output passwords respectively. These allow
381 the password to be obtained from a variety of sources. Both of these
382 options take a single argument whose format is described below. If no
383 password argument is given and a password is required then the user is
384 prompted to enter one: this will typically be read from the current
385 terminal with echoing turned off.
389 =item B<pass:password>
391 the actual password is B<password>. Since the password is visible
392 to utilities (like 'ps' under Unix) this form should only be used
393 where security is not important.
397 obtain the password from the environment variable B<var>. Since
398 the environment of other processes is visible on certain platforms
399 (e.g. ps under certain Unix OSes) this option should be used with caution.
401 =item B<file:pathname>
403 the first line of B<pathname> is the password. If the same B<pathname>
404 argument is supplied to B<-passin> and B<-passout> arguments then the first
405 line will be used for the input password and the next line for the output
406 password. B<pathname> need not refer to a regular file: it could for example
407 refer to a device or named pipe.
411 read the password from the file descriptor B<number>. This can be used to
412 send the data via a pipe for example.
416 read the password from standard input.
422 L<asn1parse(1)>, L<ca(1)>, L<config(5)>,
423 L<crl(1)>, L<crl2pkcs7(1)>, L<dgst(1)>,
424 L<dhparam(1)>, L<dsa(1)>, L<dsaparam(1)>,
425 L<enc(1)>, L<engine(1)>, L<gendsa(1)>, L<genpkey(1)>,
426 L<genrsa(1)>, L<nseq(1)>, L<openssl(1)>,
428 L<pkcs12(1)>, L<pkcs7(1)>, L<pkcs8(1)>,
429 L<rand(1)>, L<req(1)>, L<rsa(1)>,
430 L<rsautl(1)>, L<s_client(1)>,
431 L<s_server(1)>, L<s_time(1)>,
432 L<smime(1)>, L<spkac(1)>,
433 L<verify(1)>, L<version(1)>, L<x509(1)>,
434 L<crypto(7)>, L<ssl(7)>, L<x509v3_config(5)>
438 The B<list->I<XXX>B<-algorithms> pseudo-commands were added in OpenSSL 1.0.0;
439 For notes on the availability of other commands, see their individual
444 Copyright 2000-2016 The OpenSSL Project Authors. All Rights Reserved.
446 Licensed under the OpenSSL license (the "License"). You may not use
447 this file except in compliance with the License. You can obtain a copy
448 in the file LICENSE in the source distribution or at
449 L<https://www.openssl.org/source/license.html>.