⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 spkac.pod

📁 开源的ssl算法openssl,版本0.9.8H
💻 POD
字号:
=pod=head1 NAMEspkac - SPKAC printing and generating utility=head1 SYNOPSISB<openssl> B<spkac>[B<-in filename>][B<-out filename>][B<-key keyfile>][B<-passin arg>][B<-challenge string>][B<-pubkey>][B<-spkac spkacname>][B<-spksect section>][B<-noout>][B<-verify>][B<-engine id>]=head1 DESCRIPTIONThe B<spkac> command processes Netscape signed public key and challenge(SPKAC) files. It can print out their contents, verify the signature andproduce its own SPKACs from a supplied private key.=head1 COMMAND OPTIONS=over 4=item B<-in filename>This specifies the input filename to read from or standard input if thisoption is not specified. Ignored if the B<-key> option is used.=item B<-out filename>specifies the output filename to write to or standard output bydefault.=item B<-key keyfile>create an SPKAC file using the private key in B<keyfile>. TheB<-in>, B<-noout>, B<-spksect> and B<-verify> options are ignored ifpresent.=item B<-passin password>the input file password source. For more information about the format of B<arg>see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)|openssl(1)>.=item B<-challenge string>specifies the challenge string if an SPKAC is being created.=item B<-spkac spkacname>allows an alternative name form the variable containing theSPKAC. The default is "SPKAC". This option affects bothgenerated and input SPKAC files.=item B<-spksect section>allows an alternative name form the section containing theSPKAC. The default is the default section.=item B<-noout>don't output the text version of the SPKAC (not used if anSPKAC is being created).=item B<-pubkey>output the public key of an SPKAC (not used if an SPKAC isbeing created).=item B<-verify>verifies the digital signature on the supplied SPKAC.=item B<-engine id>specifying an engine (by it's unique B<id> string) will cause B<req>to attempt to obtain a functional reference to the specified engine,thus initialising it if needed. The engine will then be set as the defaultfor all available algorithms.=back=head1 EXAMPLESPrint out the contents of an SPKAC: openssl spkac -in spkac.cnfVerify the signature of an SPKAC: openssl spkac -in spkac.cnf -noout -verifyCreate an SPKAC using the challenge string "hello": openssl spkac -key key.pem -challenge hello -out spkac.cnfExample of an SPKAC, (long lines split up for clarity): SPKAC=MIG5MGUwXDANBgkqhkiG9w0BAQEFAANLADBIAkEA1cCoq2Wa3Ixs47uI7F\ PVwHVIPDx5yso105Y6zpozam135a8R0CpoRvkkigIyXfcCjiVi5oWk+6FfPaD03u\ PFoQIDAQABFgVoZWxsbzANBgkqhkiG9w0BAQQFAANBAFpQtY/FojdwkJh1bEIYuc\ 2EeM2KHTWPEepWYeawvHD0gQ3DngSC75YCWnnDdq+NQ3F+X4deMx9AaEglZtULwV\ 4==head1 NOTESA created SPKAC with suitable DN components appended can be fed intothe B<ca> utility.SPKACs are typically generated by Netscape when a form is submittedcontaining the B<KEYGEN> tag as part of the certificate enrollmentprocess.The challenge string permits a primitive form of proof of possessionof private key. By checking the SPKAC signature and a random challengestring some guarantee is given that the user knows the private keycorresponding to the public key being certified. This is important insome applications. Without this it is possible for a previous SPKACto be used in a "replay attack".=head1 SEE ALSOL<ca(1)|ca(1)>=cut

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -