summaryrefslogtreecommitdiffstats
path: root/doc
diff options
context:
space:
mode:
authorHubert Kario <hkario@redhat.com>2014-06-19 14:17:26 +0200
committerMatt Caswell <matt@openssl.org>2014-06-19 23:09:21 +0100
commitcd028c8e668fc8655f4035408df3f63acce86d80 (patch)
tree0d25ecb64ca139e85f1c5e4f48092f88dd2b3087 /doc
parentce21d108bdb51cfbd68f4f4980a7d30b24403aa8 (diff)
add description of missing options to verify man page
The options related to policy used for verification, verification of subject names in certificate and certificate chain handling were missing in the verify(1) man page. This fixes this issue.
Diffstat (limited to 'doc')
-rw-r--r--doc/apps/verify.pod47
1 files changed, 47 insertions, 0 deletions
diff --git a/doc/apps/verify.pod b/doc/apps/verify.pod
index 764e617c34..4a5d767399 100644
--- a/doc/apps/verify.pod
+++ b/doc/apps/verify.pod
@@ -9,6 +9,7 @@ verify - Utility to verify certificates.
B<openssl> B<verify>
[B<-CApath directory>]
[B<-CAfile file>]
+[B<-check_ss_sig>]
[B<-trusted_first>]
[B<-purpose purpose>]
[B<-policy arg>]
@@ -27,7 +28,16 @@ B<openssl> B<verify>
[B<-help>]
[B<-issuer_checks>]
[B<-attime timestamp>]
+[B<-partial_chain>]
+[B<-suiteB_128>]
+[B<-suiteB_128_only>]
+[B<-suiteB_192>]
[B<-verbose>]
+[B<-verify_depth num>]
+[B<-verify_email email>]
+[B<-verify_hostname hostname>]
+[B<-verify_ip ip>]
+[B<-verify_name name>]
[B<->]
[certificates]
@@ -155,6 +165,43 @@ Enable support for delta CRLs.
Verify the signature on the self-signed root CA. This is disabled by default
because it doesn't add any security.
+=item B<-partial_chain>
+
+Allow partial certificate chain if at least one certificate is in trusted store.
+
+=item B<-suiteB_128_only>, B<-suiteB_128>, B<-suiteB_192>
+
+enable the Suite B mode operation at 128 bit Level of Security, 128 bit or
+192 bit, or only 192 bit Level of Security respectively.
+See RFC6460 for details. In particular the supported signature algorithms are
+reduced to support only ECDSA and SHA256 or SHA384 and only the elliptic curves
+P-256 and P-384.
+
+=item B<-verify_depth num>
+
+Limit the maximum depth of the certificate chain to B<num> certificates.
+
+=item B<-verify_email email>
+
+Verify if the B<email> matches the email address in Subject Alternative Name or
+the email the subject Distinguished Name.
+
+=item B<-verify_hostname hostname>
+
+Verify if the B<hostname> matches DNS name in Subject Alternative Name or
+Common Name in the subject certificate.
+
+=item B<-verify_ip ip>
+
+Verify if the B<ip> matches the IP address in Subject Alternative Name of
+the subject certificate.
+
+=item B<-verify_name name>
+
+Use default verification options like trust model and required certificate
+policies identified by B<name>.
+Supported usages include: default, pkcs7, smime_sign, ssl_client, ssl_server.
+
=item B<->
Indicates the last option. All arguments following this are assumed to be