From: Hubert Kario Date: Thu, 19 Jun 2014 12:17:26 +0000 (+0200) Subject: add description of missing options to verify man page X-Git-Tag: master-post-reformat~687 X-Git-Url: https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff_plain;h=cd028c8e668fc8655f4035408df3f63acce86d80;ds=sidebyside add description of missing options to verify man page The options related to policy used for verification, verification of subject names in certificate and certificate chain handling were missing in the verify(1) man page. This fixes this issue. --- diff --git a/doc/apps/verify.pod b/doc/apps/verify.pod index 764e617c34..4a5d767399 100644 --- a/doc/apps/verify.pod +++ b/doc/apps/verify.pod @@ -9,6 +9,7 @@ verify - Utility to verify certificates. B B [B<-CApath directory>] [B<-CAfile file>] +[B<-check_ss_sig>] [B<-trusted_first>] [B<-purpose purpose>] [B<-policy arg>] @@ -27,7 +28,16 @@ B B [B<-help>] [B<-issuer_checks>] [B<-attime timestamp>] +[B<-partial_chain>] +[B<-suiteB_128>] +[B<-suiteB_128_only>] +[B<-suiteB_192>] [B<-verbose>] +[B<-verify_depth num>] +[B<-verify_email email>] +[B<-verify_hostname hostname>] +[B<-verify_ip ip>] +[B<-verify_name name>] [B<->] [certificates] @@ -155,6 +165,43 @@ Enable support for delta CRLs. Verify the signature on the self-signed root CA. This is disabled by default because it doesn't add any security. +=item B<-partial_chain> + +Allow partial certificate chain if at least one certificate is in trusted store. + +=item B<-suiteB_128_only>, B<-suiteB_128>, B<-suiteB_192> + +enable the Suite B mode operation at 128 bit Level of Security, 128 bit or +192 bit, or only 192 bit Level of Security respectively. +See RFC6460 for details. In particular the supported signature algorithms are +reduced to support only ECDSA and SHA256 or SHA384 and only the elliptic curves +P-256 and P-384. + +=item B<-verify_depth num> + +Limit the maximum depth of the certificate chain to B certificates. + +=item B<-verify_email email> + +Verify if the B matches the email address in Subject Alternative Name or +the email the subject Distinguished Name. + +=item B<-verify_hostname hostname> + +Verify if the B matches DNS name in Subject Alternative Name or +Common Name in the subject certificate. + +=item B<-verify_ip ip> + +Verify if the B matches the IP address in Subject Alternative Name of +the subject certificate. + +=item B<-verify_name name> + +Use default verification options like trust model and required certificate +policies identified by B. +Supported usages include: default, pkcs7, smime_sign, ssl_client, ssl_server. + =item B<-> Indicates the last option. All arguments following this are assumed to be