003 File Manager
Current Path:
/usr/src/crypto/openssl/doc/man1
usr
/
src
/
crypto
/
openssl
/
doc
/
man1
/
📁
..
📄
CA.pl.pod
(6.77 KB)
📄
asn1parse.pod
(5.9 KB)
📄
ca.pod
(24.76 KB)
📄
ciphers.pod
(27.73 KB)
📄
cms.pod
(23.41 KB)
📄
crl.pod
(2.79 KB)
📄
crl2pkcs7.pod
(2.78 KB)
📄
dgst.pod
(6.39 KB)
📄
dhparam.pod
(4.36 KB)
📄
dsa.pod
(4.81 KB)
📄
dsaparam.pod
(3.25 KB)
📄
ec.pod
(5.65 KB)
📄
ecparam.pod
(5 KB)
📄
enc.pod
(13.73 KB)
📄
engine.pod
(2.82 KB)
📄
errstr.pod
(958 B)
📄
gendsa.pod
(2.48 KB)
📄
genpkey.pod
(9.41 KB)
📄
genrsa.pod
(3.48 KB)
📄
list.pod
(2.02 KB)
📄
nseq.pod
(2.04 KB)
📄
ocsp.pod
(16.03 KB)
📄
openssl.pod
(12.42 KB)
📄
passwd.pod
(2.78 KB)
📄
pkcs12.pod
(11.7 KB)
📄
pkcs7.pod
(2.59 KB)
📄
pkcs8.pod
(9.82 KB)
📄
pkey.pod
(4.05 KB)
📄
pkeyparam.pod
(1.9 KB)
📄
pkeyutl.pod
(9.61 KB)
📄
prime.pod
(1.23 KB)
📄
rand.pod
(2.39 KB)
📄
rehash.pod
(4.13 KB)
📄
req.pod
(22.58 KB)
📄
rsa.pod
(5.28 KB)
📄
rsautl.pod
(5.76 KB)
📄
s_client.pod
(26.78 KB)
📄
s_server.pod
(24.89 KB)
📄
s_time.pod
(7.2 KB)
📄
sess_id.pod
(4.08 KB)
📄
smime.pod
(16.29 KB)
📄
speed.pod
(2.62 KB)
📄
spkac.pod
(3.78 KB)
📄
srp.pod
(1.66 KB)
📄
storeutl.pod
(2.92 KB)
📄
ts.pod
(20.61 KB)
📄
tsget.pod
(6.26 KB)
📄
verify.pod
(23.24 KB)
📄
version.pod
(1.18 KB)
📄
x509.pod
(28.08 KB)
Editing: nseq.pod
=pod =head1 NAME openssl-nseq, nseq - create or examine a Netscape certificate sequence =head1 SYNOPSIS B<openssl> B<nseq> [B<-help>] [B<-in filename>] [B<-out filename>] [B<-toseq>] =head1 DESCRIPTION The B<nseq> command takes a file containing a Netscape certificate sequence and prints out the certificates contained in it or takes a file of certificates and converts it into a Netscape certificate sequence. =head1 OPTIONS =over 4 =item B<-help> Print out a usage message. =item B<-in filename> This specifies the input filename to read or standard input if this option is not specified. =item B<-out filename> Specifies the output filename or standard output by default. =item B<-toseq> Normally a Netscape certificate sequence will be input and the output is the certificates contained in it. With the B<-toseq> option the situation is reversed: a Netscape certificate sequence is created from a file of certificates. =back =head1 EXAMPLES Output the certificates in a Netscape certificate sequence openssl nseq -in nseq.pem -out certs.pem Create a Netscape certificate sequence openssl nseq -in certs.pem -toseq -out nseq.pem =head1 NOTES The B<PEM> encoded form uses the same headers and footers as a certificate: -----BEGIN CERTIFICATE----- -----END CERTIFICATE----- A Netscape certificate sequence is a Netscape specific format that can be sent to browsers as an alternative to the standard PKCS#7 format when several certificates are sent to the browser: for example during certificate enrollment. It is used by Netscape certificate server for example. =head1 BUGS This program needs a few more options: like allowing DER or PEM input and output files and allowing multiple certificate files to be used. =head1 COPYRIGHT Copyright 2000-2017 The OpenSSL Project Authors. All Rights Reserved. Licensed under the OpenSSL license (the "License"). You may not use this file except in compliance with the License. You can obtain a copy in the file LICENSE in the source distribution or at L<https://www.openssl.org/source/license.html>. =cut
Upload File
Create Folder