NAME
openssl - OpenSSL command line tool
SYNOPSIS
ooppeennssssll command [ commandopts ] [ commandargs ]ooppeennssssll [ lliisstt-ssttaannddaarrdd-ccoommmmaannddss | lliisstt-mmeessssaaggee-ddiiggeesstt-ccoommmmaannddss | lliisstt-
cciipphheerr-ccoommmmaannddss ]
ooppeennssssll nnoo-XXX [ arbitrary options ]
DESCRIPTION
OpenSSL is a cryptography toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) network protocols and related cryptography standards required by them. The ooppeennssssll program is a command line tool for using the various cryptography functions of OpenSSL's ccrryyppttoo library from the shell. It can be used for o Creation of RSA, DH and DSA key parameters o Creation of X.509 certificates, CSRs and CRLs o Calculation of Message Digests o Encryption and Decryption with Ciphers o SSL/TLS Client and Server Tests o Handling of S/MIME signed or encrypted mail CCOOMMMMAANNDD SSUUMMMMAARRYY The ooppeennssssll program provides a rich variety of commands (command in theSYNOPSIS above), each of which often has a wealth of options and
arguments (commandopts and commandargs in the SYNOPSIS).
The pseudo-commands lliisstt-ssttaannddaarrdd-ccoommmmaannddss, lliisstt-mmeessssaaggee-ddiiggeesstt-
ccoommmmaannddss, and lliisstt-cciipphheerr-ccoommmmaannddss output a list (one entry per line)
of the names of all standard commands, message digest commands, or cipher commands, respectively, that are available in the present ooppeennssssll utility.The pseudo-command nnoo-XXX tests whether a command of the specified name
is available. If no command named XXX exists, it returns 0 (success)and prints nnoo-XXX; otherwise it returns 1 and prints XXX. In both
cases, the output goes to ssttddoouutt and nothing is printed to ssttddeerrrr. Additional command line arguments are always ignored. Since for each cipher there is a command of the same name, this provides an easy way for shell scripts to test for the availability of ciphers in theooppeennssssll program. (nnoo-XXX is not able to detect pseudo-commands such as
qquuiitt, lliisstt-...-ccoommmmaannddss, or nnoo-XXX itself.)
SSTTAANNDDAARRDD CCOOMMMMAANNDDSS aassnn11ppaarrssee Parse an ASN.1 sequence. ccaa Certificate Authority (CA) Management. cciipphheerrss Cipher Suite Description Determination. ccrrll Certificate Revocation List (CRL) Management.ccrrll22ppkkccss77 CRL to PKCS#7 Conversion.
ddggsstt Message Digest Calculation.ddhh Diffie-Hellman Parameter Management. Obsoleted by ddhhppaarraamm.
ddssaa DSA Data Management. ddssaappaarraamm DSA Parameter Generation. eenncc Encoding with Ciphers. eerrrrssttrr Error Number to Error String Conversion.ddhhppaarraamm Generation and Management of Diffie-Hellman Parameters.
ggeennddhh Generation of Diffie-Hellman Parameters. Obsoleted by
ddhhppaarraamm. ggeennddssaa Generation of DSA Parameters. ggeennrrssaa Generation of RSA Parameters. ooccsspp Online Certificate Status Protocol utility. ppaasssswwdd Generation of hashed passwords.ppkkccss1122 PKCS#12 Data Management.
ppkkccss77 PKCS#7 Data Management.
rraanndd Generate pseudo-random bytes.
rreeqq X.509 Certificate Signing Request (CSR) Management. rrssaa RSA Data Management. rrssaauuttll RSA utility for signing, verification, encryption, and decryption. sscclliieenntt This implements a generic SSL/TLS client which can establish a transparent connection to a remote server speaking SSL/TLS. It's intended for testing purposes only and provides only rudimentary interface functionality but internally uses mostly all functionality of the OpenSSL ssssll library. sssseerrvveerr This implements a generic SSL/TLS server which accepts connections from remote clients speaking SSL/TLS. It's intended for testing purposes only and provides only rudimentary interface functionality but internally uses mostly all functionality of the OpenSSL ssssll library. It provides both an own command line oriented protocol for testing SSL functions and a simple HTTP response facility toemulate an SSL/TLS-aware webserver.
ssttiimmee SSL Connection Timer. sseessssiidd SSL Session Data Management. ssmmiimmee S/MIME mail processing. ssppeeeedd Algorithm Speed Measurement. vveerriiffyy X.509 Certificate Verification. vveerrssiioonn OpenSSL Version Information. xx550099 X.509 Certificate Data Management. MMEESSSSAAGGEE DDIIGGEESSTT CCOOMMMMAANNDDSS mmdd22 MD2 Digest mmdd55 MD5 Digest mmddcc22 MDC2 Digestrrmmdd116600 RMD-160 Digest
sshhaa SHA Digestsshhaa11 SHA-1 Digest
EENNCCOODDIINNGG AANNDD CCIIPPHHEERR CCOOMMMMAANNDDSS bbaassee6644 Base64 Encodingbbff bbff-ccbbcc bbff-ccffbb bbff-eeccbb bbff-ooffbb
Blowfish Cipherccaasstt ccaasstt-ccbbcc
CAST Cipherccaasstt55-ccbbcc ccaasstt55-ccffbb ccaasstt55-eeccbb ccaasstt55-ooffbb
CAST5 Cipherddeess ddeess-ccbbcc ddeess-ccffbb ddeess-eeccbb ddeess-eeddee ddeess-eeddee-ccbbcc ddeess-eeddee-ccffbb ddeess-eeddee-ooffbb
ddeess-ooffbb
DES Cipherddeess33 ddeessxx ddeess-eeddee33 ddeess-eeddee33-ccbbcc ddeess-eeddee33-ccffbb ddeess-eeddee33-ooffbb
Triple-DES Cipher
iiddeeaa iiddeeaa-ccbbcc iiddeeaa-ccffbb iiddeeaa-eeccbb iiddeeaa-ooffbb
IDEA Cipherrrcc22 rrcc22-ccbbcc rrcc22-ccffbb rrcc22-eeccbb rrcc22-ooffbb
RC2 Cipher rrcc44 RC4 Cipherrrcc55 rrcc55-ccbbcc rrcc55-ccffbb rrcc55-eeccbb rrcc55-ooffbb
RC5 Cipher PPAASSSS PPHHRRAASSEE AARRGGUUMMEENNTTSSSeveral commands accept password arguments, typically using -ppaassssiinn and
-ppaassssoouutt for input and output passwords respectively. These allow the
password to be obtained from a variety of sources. Both of these options take a single argument whose format is described below. If no password argument is given and a password is required then the user is prompted to enter one: this will typically be read from the current terminal with echoing turned off. ppaassss::ppaasssswwoorrdd the actual password is ppaasssswwoorrdd. Since the password is visible to utilities (like 'ps' under Unix) this form should only be used where security is not important. eennvv::vvaarr obtain the password from the environment variable vvaarr. Since the environment of other processes is visible on certain platforms (e.g. ps under certain Unix OSes) this option should be used with caution. ffiillee::ppaatthhnnaammee the first line of ppaatthhnnaammee is the password. If the sameppaatthhnnaammee argument is supplied to -ppaassssiinn and -ppaassssoouutt
arguments then the first line will be used for the input password and the next line for the output password. ppaatthhnnaammee need not refer to a regular file: it could for example refer to a device or named pipe. ffdd::nnuummbbeerr read the password from the file descriptor nnuummbbeerr. This can be used to send the data via a pipe for example. ssttddiinn read the password from standard input.SEE ALSO
asn1parse(1), ca(1), config(5), crl(1), crl2pkcs7(1), dgst(1), dhparam(1), dsa(1), dsaparam(1), enc(1), gendsa(1), genrsa(1), nseq(1),openssl(1), passwd(1), pkcs12(1), pkcs7(1), pkcs8(1), rand(1), req(1),
rsa(1), rsautl(1), sclient(1), sserver(1), stime(1), smime(1), spkac(1), verify(1), version(1), x509(1), crypto(3), ssl(3) HISTORYThe openssl(1) document appeared in OpenSSL 0.9.2. The
lliisstt-XXX-ccoommmmaannddss pseudo-commands were added in OpenSSL 0.9.3; the
nnoo-XXX pseudo-commands were added in OpenSSL 0.9.5a. For notes on the
availability of other commands, see their individual manual pages.0.9.7l 2004-01-04 OPENSSL(1)