summaryrefslogtreecommitdiffstats
path: root/doc/apps/ocsp.pod
AgeCommit message (Collapse)Author
2016-06-01Fix various doc nits.Rich Salz
Reviewed-by: Richard Levitte <levitte@openssl.org>
2016-05-20Doc nits cleanup, round 2Rich Salz
Fix some code examples, trailing whitespace Fix TBA sections in verify, remove others. Remove empty sections Use Mixed Case not ALL CAPS in head2 Enhance doc-nits script. Remove extra =cut line Reviewed-by: Richard Levitte <levitte@openssl.org>
2016-05-20Fix nits in pod files.Rich Salz
Add doc-nit-check to help find future issues. Make podchecker be almost clean. Remove trailing whitespace. Tab expansion Reviewed-by: Richard Levitte <levitte@openssl.org>
2016-05-19Add copyright to manpagesRich Salz
Reviewed-by: Richard Levitte <levitte@openssl.org>
2016-05-12Correctly check for trailing digest options.Dr. Stephen Henson
Multiple digest options to the ocsp utility are allowed: e.g. to use different digests for different certificate IDs. A digest option without a following certificate is however illegal. RT#4215 Reviewed-by: Rich Salz <rsalz@openssl.org>
2016-05-02GH875: Document -no_check_timeRich Salz
Date: Tue Mar 15 15:19:44 2016 +0100 This commit updates the documentation of cms, ocsp, s_client, s_server, and verify to reflect the new "-no_check_time" option introduced in commit d35ff2c0ade0a12e84aaa2e9841b4983a2f3cf45 on 2015-07-31. Reviewed-by: Richard Levitte <levitte@openssl.org> Reviewed-by: Rich Salz <rsalz@openssl.org>
2016-04-03Move peer chain security checks into x509_vfy.cViktor Dukhovni
A new X509_VERIFY_PARAM_set_auth_level() function sets the authentication security level. For verification of SSL peers, this is automatically set from the SSL security level. Otherwise, for now, the authentication security level remains at (effectively) 0 by default. The new "-auth_level" verify(1) option is available in all the command-line tools that support the standard verify(1) options. New verify(1) tests added to check enforcement of chain signature and public key security levels. Also added new tests of enforcement of the verify_depth limit. Updated documentation. Reviewed-by: Dr. Stephen Henson <steve@openssl.org>
2016-02-13GH650: Minor tidying around the ocsp appBenjamin Kaduk
The ocsp utility is something of a jack-of-all-trades; most anything related to the OCSP can be done with it. In particular, the manual page calls out that it can be used as either a client or a server of the protocol, but there are also a few things that it can do which do not quite fit into either role, such as encoding an OCSP request but not sending it, printing out a text form of an OCSP response (or request) from a file akin to the asn1parse utility, or performing a lookup into the server-side revocation database without actually sending a request or response. All three of these are documented as examples in the manual page, but the documentation prior to this commit is somewhat misleading, in that when printing the text form of an OCSP response, the code also attempts to verify the response, displaying an error message and returning failure if the response does not verify. (It is possible that the response would be able to verify with the given example, since the default trust roots are used for that verification, but OCSP responses frequently have alternate certification authorities that would require passing -CAfile or -CApath for verification.) Tidy up the documentation by passing -noverify for the case of converting from binary to textual representation, and also change a few instances of -respin to -reqin as appropriate, note that the -url option provides the same functionality as the -host and -path options, clarify that the example that saves an OCSP response to a file will also perform verification on that response, and fix a couple grammar nits in the manual page. Also remove an always-true conditional for rdb != NULL -- there are no codepaths in which it could be initialized at the time of this check. Signed-off-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Kurt Roeckx <kurt@openssl.org>
2016-02-10Deprecate the -issuer_checks debugging optionViktor Dukhovni
This was a developer debugging feature and was never a useful public interface. Added all missing X509 error codes to the verify(1) manpage, but many still need a description beyond the associated text string. Sorted the errors in x509_txt.c by error number. Reviewed-by: Stephen Henson <steve@openssl.org>
2016-02-05GH628: Add -help to all apps docs.A J Mohan Rao
Signed-off-by: Rich Salz <rsalz@openssl.org> Reviewed-by: Matt Caswell <matt@openssl.org>
2015-09-25Document -no-CApath and -no-CAfileMatt Caswell
Add documentation to all the appropriate apps for the new -no-CApath and -no-CAfile options. Reviewed-by: Andy Polyakov <appro@openssl.org>
2015-08-27Various doc fixes.Rich Salz
Make all mention of digest algorithm use "any supported algorithm" RT2071, some new manpages from Victor B. Wagner <vitus@cryptocom.ru>: X509_LOOKUP_hash_dir.pod X509_check_ca.pod X509_check_issued.pod RT 1600: Remove references to non-existant objects(3) Add RETURN VALUES to BIO_do_accept page. RT1818: RSA_sign Can return values other than 0 on failure. RT3634: Fix AES CBC aliases (Steffen Nurpmeso <sdaoden@yandex.com>) RT3678: Some clarifications to BIO_new_pair (Devchandra L Meetei <dlmeetei@gmail.com>) RT3787: Fix some EVP_ function return values (Laetitia Baudoin <lbaudoin@google.com>) Reviewed-by: Tim Hudson <tjh@openssl.org>
2015-04-25apps-cleanup: the doc fixesRich Salz
Reviewed-by: Richard Levitte <levitte@openssl.org>
2015-02-25Add documentation for the -no_alt_chains option for various apps, as well asMatt Caswell
the X509_V_FLAG_NO_ALT_CHAINS flag. Reviewed-by: Dr. Stephen Henson <steve@openssl.org>
2015-02-24Document -no_explicitDr. Stephen Henson
Reviewed-by: Rich Salz <rsalz@openssl.org>
2014-11-27Add documentation on -timeout option in the ocsp utilityAndré Guerreiro
PR#3612 Reviewed-by: Dr. Stephen Henson <steve@openssl.org>
2014-06-19add references to verify(1) man page for args_verify() optionsHubert Kario
cms, ocsp, s_client, s_server and smime tools also use args_verify() for parsing options, that makes them most of the same options verify tool does. Add those options to man pages and reference their explanation in the verify man page.
2014-06-19Document -trusted_first option in man pages and help.Hubert Kario
Add -trusted_first description to help messages and man pages of tools that deal with certificate verification.
2008-02-25Clarification and fix typo.Dr. Stephen Henson
2007-12-04Submitted by: Victor B. Wagner <vitus@cryptocom.ru>, steveDr. Stephen Henson
Use default algorithms for OCSP request and response signing. New command line option to support other digest use for OCSP certificate IDs.
2003-03-26Update ocsp usage message and docs.Dr. Stephen Henson
2001-09-07ispellUlf Möller
2001-07-13Allow OCSP server to handle multiple requests.Dr. Stephen Henson
Document new OCSP options.
2001-03-09Update docs.Dr. Stephen Henson
2001-01-20Update ocsp utility documentation.Dr. Stephen Henson
2001-01-15link to the new manpage.Ulf Möller
2001-01-14Preliminary ocsp utility documentation.Dr. Stephen Henson
Fix ocsp usage message.