xref: /minix3/crypto/external/bsd/openssl/dist/doc/apps/ocsp.pod (revision 0a6a1f1d05b60e214de2f05a7310ddd1f0e590e7)
1ebfedea0SLionel Sambuc=pod
2ebfedea0SLionel Sambuc
3ebfedea0SLionel Sambuc=head1 NAME
4ebfedea0SLionel Sambuc
5ebfedea0SLionel Sambucocsp - Online Certificate Status Protocol utility
6ebfedea0SLionel Sambuc
7ebfedea0SLionel Sambuc=head1 SYNOPSIS
8ebfedea0SLionel Sambuc
9ebfedea0SLionel SambucB<openssl> B<ocsp>
10ebfedea0SLionel Sambuc[B<-out file>]
11ebfedea0SLionel Sambuc[B<-issuer file>]
12ebfedea0SLionel Sambuc[B<-cert file>]
13ebfedea0SLionel Sambuc[B<-serial n>]
14ebfedea0SLionel Sambuc[B<-signer file>]
15ebfedea0SLionel Sambuc[B<-signkey file>]
16ebfedea0SLionel Sambuc[B<-sign_other file>]
17ebfedea0SLionel Sambuc[B<-no_certs>]
18ebfedea0SLionel Sambuc[B<-req_text>]
19ebfedea0SLionel Sambuc[B<-resp_text>]
20ebfedea0SLionel Sambuc[B<-text>]
21ebfedea0SLionel Sambuc[B<-reqout file>]
22ebfedea0SLionel Sambuc[B<-respout file>]
23ebfedea0SLionel Sambuc[B<-reqin file>]
24ebfedea0SLionel Sambuc[B<-respin file>]
25ebfedea0SLionel Sambuc[B<-nonce>]
26ebfedea0SLionel Sambuc[B<-no_nonce>]
27ebfedea0SLionel Sambuc[B<-url URL>]
28ebfedea0SLionel Sambuc[B<-host host:n>]
29ebfedea0SLionel Sambuc[B<-path>]
30ebfedea0SLionel Sambuc[B<-CApath dir>]
31ebfedea0SLionel Sambuc[B<-CAfile file>]
32*0a6a1f1dSLionel Sambuc[B<-no_alt_chains>]]
33ebfedea0SLionel Sambuc[B<-VAfile file>]
34ebfedea0SLionel Sambuc[B<-validity_period n>]
35ebfedea0SLionel Sambuc[B<-status_age n>]
36ebfedea0SLionel Sambuc[B<-noverify>]
37ebfedea0SLionel Sambuc[B<-verify_other file>]
38ebfedea0SLionel Sambuc[B<-trust_other>]
39ebfedea0SLionel Sambuc[B<-no_intern>]
40ebfedea0SLionel Sambuc[B<-no_signature_verify>]
41ebfedea0SLionel Sambuc[B<-no_cert_verify>]
42ebfedea0SLionel Sambuc[B<-no_chain>]
43ebfedea0SLionel Sambuc[B<-no_cert_checks>]
44*0a6a1f1dSLionel Sambuc[B<-no_explicit>]
45ebfedea0SLionel Sambuc[B<-port num>]
46ebfedea0SLionel Sambuc[B<-index file>]
47ebfedea0SLionel Sambuc[B<-CA file>]
48ebfedea0SLionel Sambuc[B<-rsigner file>]
49ebfedea0SLionel Sambuc[B<-rkey file>]
50ebfedea0SLionel Sambuc[B<-rother file>]
51ebfedea0SLionel Sambuc[B<-resp_no_certs>]
52ebfedea0SLionel Sambuc[B<-nmin n>]
53ebfedea0SLionel Sambuc[B<-ndays n>]
54ebfedea0SLionel Sambuc[B<-resp_key_id>]
55ebfedea0SLionel Sambuc[B<-nrequest n>]
56ebfedea0SLionel Sambuc[B<-md5|-sha1|...>]
57ebfedea0SLionel Sambuc
58ebfedea0SLionel Sambuc=head1 DESCRIPTION
59ebfedea0SLionel Sambuc
60ebfedea0SLionel SambucThe Online Certificate Status Protocol (OCSP) enables applications to
61ebfedea0SLionel Sambucdetermine the (revocation) state of an identified certificate (RFC 2560).
62ebfedea0SLionel Sambuc
63ebfedea0SLionel SambucThe B<ocsp> command performs many common OCSP tasks. It can be used
64ebfedea0SLionel Sambucto print out requests and responses, create requests and send queries
65ebfedea0SLionel Sambucto an OCSP responder and behave like a mini OCSP server itself.
66ebfedea0SLionel Sambuc
67ebfedea0SLionel Sambuc=head1 OCSP CLIENT OPTIONS
68ebfedea0SLionel Sambuc
69ebfedea0SLionel Sambuc=over 4
70ebfedea0SLionel Sambuc
71ebfedea0SLionel Sambuc=item B<-out filename>
72ebfedea0SLionel Sambuc
73ebfedea0SLionel Sambucspecify output filename, default is standard output.
74ebfedea0SLionel Sambuc
75ebfedea0SLionel Sambuc=item B<-issuer filename>
76ebfedea0SLionel Sambuc
77ebfedea0SLionel SambucThis specifies the current issuer certificate. This option can be used
78ebfedea0SLionel Sambucmultiple times. The certificate specified in B<filename> must be in
79ebfedea0SLionel SambucPEM format. This option B<MUST> come before any B<-cert> options.
80ebfedea0SLionel Sambuc
81ebfedea0SLionel Sambuc=item B<-cert filename>
82ebfedea0SLionel Sambuc
83ebfedea0SLionel SambucAdd the certificate B<filename> to the request. The issuer certificate
84ebfedea0SLionel Sambucis taken from the previous B<issuer> option, or an error occurs if no
85ebfedea0SLionel Sambucissuer certificate is specified.
86ebfedea0SLionel Sambuc
87ebfedea0SLionel Sambuc=item B<-serial num>
88ebfedea0SLionel Sambuc
89ebfedea0SLionel SambucSame as the B<cert> option except the certificate with serial number
90ebfedea0SLionel SambucB<num> is added to the request. The serial number is interpreted as a
91ebfedea0SLionel Sambucdecimal integer unless preceded by B<0x>. Negative integers can also
92ebfedea0SLionel Sambucbe specified by preceding the value by a B<-> sign.
93ebfedea0SLionel Sambuc
94ebfedea0SLionel Sambuc=item B<-signer filename>, B<-signkey filename>
95ebfedea0SLionel Sambuc
96ebfedea0SLionel SambucSign the OCSP request using the certificate specified in the B<signer>
97ebfedea0SLionel Sambucoption and the private key specified by the B<signkey> option. If
98ebfedea0SLionel Sambucthe B<signkey> option is not present then the private key is read
99ebfedea0SLionel Sambucfrom the same file as the certificate. If neither option is specified then
100ebfedea0SLionel Sambucthe OCSP request is not signed.
101ebfedea0SLionel Sambuc
102ebfedea0SLionel Sambuc=item B<-sign_other filename>
103ebfedea0SLionel Sambuc
104ebfedea0SLionel SambucAdditional certificates to include in the signed request.
105ebfedea0SLionel Sambuc
106ebfedea0SLionel Sambuc=item B<-nonce>, B<-no_nonce>
107ebfedea0SLionel Sambuc
108ebfedea0SLionel SambucAdd an OCSP nonce extension to a request or disable OCSP nonce addition.
109ebfedea0SLionel SambucNormally if an OCSP request is input using the B<respin> option no
110ebfedea0SLionel Sambucnonce is added: using the B<nonce> option will force addition of a nonce.
111ebfedea0SLionel SambucIf an OCSP request is being created (using B<cert> and B<serial> options)
112ebfedea0SLionel Sambuca nonce is automatically added specifying B<no_nonce> overrides this.
113ebfedea0SLionel Sambuc
114ebfedea0SLionel Sambuc=item B<-req_text>, B<-resp_text>, B<-text>
115ebfedea0SLionel Sambuc
116ebfedea0SLionel Sambucprint out the text form of the OCSP request, response or both respectively.
117ebfedea0SLionel Sambuc
118ebfedea0SLionel Sambuc=item B<-reqout file>, B<-respout file>
119ebfedea0SLionel Sambuc
120ebfedea0SLionel Sambucwrite out the DER encoded certificate request or response to B<file>.
121ebfedea0SLionel Sambuc
122ebfedea0SLionel Sambuc=item B<-reqin file>, B<-respin file>
123ebfedea0SLionel Sambuc
124ebfedea0SLionel Sambucread OCSP request or response file from B<file>. These option are ignored
125ebfedea0SLionel Sambucif OCSP request or response creation is implied by other options (for example
126ebfedea0SLionel Sambucwith B<serial>, B<cert> and B<host> options).
127ebfedea0SLionel Sambuc
128ebfedea0SLionel Sambuc=item B<-url responder_url>
129ebfedea0SLionel Sambuc
130ebfedea0SLionel Sambucspecify the responder URL. Both HTTP and HTTPS (SSL/TLS) URLs can be specified.
131ebfedea0SLionel Sambuc
132ebfedea0SLionel Sambuc=item B<-host hostname:port>, B<-path pathname>
133ebfedea0SLionel Sambuc
134ebfedea0SLionel Sambucif the B<host> option is present then the OCSP request is sent to the host
135ebfedea0SLionel SambucB<hostname> on port B<port>. B<path> specifies the HTTP path name to use
136ebfedea0SLionel Sambucor "/" by default.
137ebfedea0SLionel Sambuc
138*0a6a1f1dSLionel Sambuc=item B<-timeout seconds>
139*0a6a1f1dSLionel Sambuc
140*0a6a1f1dSLionel Sambucconnection timeout to the OCSP responder in seconds
141*0a6a1f1dSLionel Sambuc
142ebfedea0SLionel Sambuc=item B<-CAfile file>, B<-CApath pathname>
143ebfedea0SLionel Sambuc
144ebfedea0SLionel Sambucfile or pathname containing trusted CA certificates. These are used to verify
145ebfedea0SLionel Sambucthe signature on the OCSP response.
146ebfedea0SLionel Sambuc
147*0a6a1f1dSLionel Sambuc=item B<-no_alt_chains>
148*0a6a1f1dSLionel Sambuc
149*0a6a1f1dSLionel SambucSee L<B<verify>|verify(1)> manual page for details.
150*0a6a1f1dSLionel Sambuc
151ebfedea0SLionel Sambuc=item B<-verify_other file>
152ebfedea0SLionel Sambuc
153ebfedea0SLionel Sambucfile containing additional certificates to search when attempting to locate
154ebfedea0SLionel Sambucthe OCSP response signing certificate. Some responders omit the actual signer's
155ebfedea0SLionel Sambuccertificate from the response: this option can be used to supply the necessary
156ebfedea0SLionel Sambuccertificate in such cases.
157ebfedea0SLionel Sambuc
158ebfedea0SLionel Sambuc=item B<-trust_other>
159ebfedea0SLionel Sambuc
160ebfedea0SLionel Sambucthe certificates specified by the B<-verify_other> option should be explicitly
161ebfedea0SLionel Sambuctrusted and no additional checks will be performed on them. This is useful
162ebfedea0SLionel Sambucwhen the complete responder certificate chain is not available or trusting a
163ebfedea0SLionel Sambucroot CA is not appropriate.
164ebfedea0SLionel Sambuc
165ebfedea0SLionel Sambuc=item B<-VAfile file>
166ebfedea0SLionel Sambuc
167ebfedea0SLionel Sambucfile containing explicitly trusted responder certificates. Equivalent to the
168ebfedea0SLionel SambucB<-verify_other> and B<-trust_other> options.
169ebfedea0SLionel Sambuc
170ebfedea0SLionel Sambuc=item B<-noverify>
171ebfedea0SLionel Sambuc
172ebfedea0SLionel Sambucdon't attempt to verify the OCSP response signature or the nonce values. This
173ebfedea0SLionel Sambucoption will normally only be used for debugging since it disables all verification
174ebfedea0SLionel Sambucof the responders certificate.
175ebfedea0SLionel Sambuc
176ebfedea0SLionel Sambuc=item B<-no_intern>
177ebfedea0SLionel Sambuc
178ebfedea0SLionel Sambucignore certificates contained in the OCSP response when searching for the
179ebfedea0SLionel Sambucsigners certificate. With this option the signers certificate must be specified
180ebfedea0SLionel Sambucwith either the B<-verify_other> or B<-VAfile> options.
181ebfedea0SLionel Sambuc
182ebfedea0SLionel Sambuc=item B<-no_signature_verify>
183ebfedea0SLionel Sambuc
184ebfedea0SLionel Sambucdon't check the signature on the OCSP response. Since this option tolerates invalid
185ebfedea0SLionel Sambucsignatures on OCSP responses it will normally only be used for testing purposes.
186ebfedea0SLionel Sambuc
187ebfedea0SLionel Sambuc=item B<-no_cert_verify>
188ebfedea0SLionel Sambuc
189ebfedea0SLionel Sambucdon't verify the OCSP response signers certificate at all. Since this option allows
190ebfedea0SLionel Sambucthe OCSP response to be signed by any certificate it should only be used for
191ebfedea0SLionel Sambuctesting purposes.
192ebfedea0SLionel Sambuc
193ebfedea0SLionel Sambuc=item B<-no_chain>
194ebfedea0SLionel Sambuc
195ebfedea0SLionel Sambucdo not use certificates in the response as additional untrusted CA
196ebfedea0SLionel Sambuccertificates.
197ebfedea0SLionel Sambuc
198*0a6a1f1dSLionel Sambuc=item B<-no_explicit>
199*0a6a1f1dSLionel Sambuc
200*0a6a1f1dSLionel Sambucdo not explicitly trust the root CA if it is set to be trusted for OCSP signing.
201*0a6a1f1dSLionel Sambuc
202ebfedea0SLionel Sambuc=item B<-no_cert_checks>
203ebfedea0SLionel Sambuc
204ebfedea0SLionel Sambucdon't perform any additional checks on the OCSP response signers certificate.
205ebfedea0SLionel SambucThat is do not make any checks to see if the signers certificate is authorised
206ebfedea0SLionel Sambucto provide the necessary status information: as a result this option should
207ebfedea0SLionel Sambuconly be used for testing purposes.
208ebfedea0SLionel Sambuc
209ebfedea0SLionel Sambuc=item B<-validity_period nsec>, B<-status_age age>
210ebfedea0SLionel Sambuc
211ebfedea0SLionel Sambucthese options specify the range of times, in seconds, which will be tolerated
212ebfedea0SLionel Sambucin an OCSP response. Each certificate status response includes a B<notBefore> time and
213ebfedea0SLionel Sambucan optional B<notAfter> time. The current time should fall between these two values, but
214ebfedea0SLionel Sambucthe interval between the two times may be only a few seconds. In practice the OCSP
215ebfedea0SLionel Sambucresponder and clients clocks may not be precisely synchronised and so such a check
216ebfedea0SLionel Sambucmay fail. To avoid this the B<-validity_period> option can be used to specify an
217ebfedea0SLionel Sambucacceptable error range in seconds, the default value is 5 minutes.
218ebfedea0SLionel Sambuc
219ebfedea0SLionel SambucIf the B<notAfter> time is omitted from a response then this means that new status
220ebfedea0SLionel Sambucinformation is immediately available. In this case the age of the B<notBefore> field
221ebfedea0SLionel Sambucis checked to see it is not older than B<age> seconds old. By default this additional
222ebfedea0SLionel Sambuccheck is not performed.
223ebfedea0SLionel Sambuc
224ebfedea0SLionel Sambuc=item B<-md5|-sha1|-sha256|-ripemod160|...>
225ebfedea0SLionel Sambuc
226ebfedea0SLionel Sambucthis option sets digest algorithm to use for certificate identification
227ebfedea0SLionel Sambucin the OCSP request. By default SHA-1 is used.
228ebfedea0SLionel Sambuc
229ebfedea0SLionel Sambuc=back
230ebfedea0SLionel Sambuc
231ebfedea0SLionel Sambuc=head1 OCSP SERVER OPTIONS
232ebfedea0SLionel Sambuc
233ebfedea0SLionel Sambuc=over 4
234ebfedea0SLionel Sambuc
235ebfedea0SLionel Sambuc=item B<-index indexfile>
236ebfedea0SLionel Sambuc
237ebfedea0SLionel SambucB<indexfile> is a text index file in B<ca> format containing certificate revocation
238ebfedea0SLionel Sambucinformation.
239ebfedea0SLionel Sambuc
240ebfedea0SLionel SambucIf the B<index> option is specified the B<ocsp> utility is in responder mode, otherwise
241ebfedea0SLionel Sambucit is in client mode. The request(s) the responder processes can be either specified on
242ebfedea0SLionel Sambucthe command line (using B<issuer> and B<serial> options), supplied in a file (using the
243ebfedea0SLionel SambucB<respin> option) or via external OCSP clients (if B<port> or B<url> is specified).
244ebfedea0SLionel Sambuc
245ebfedea0SLionel SambucIf the B<index> option is present then the B<CA> and B<rsigner> options must also be
246ebfedea0SLionel Sambucpresent.
247ebfedea0SLionel Sambuc
248ebfedea0SLionel Sambuc=item B<-CA file>
249ebfedea0SLionel Sambuc
250ebfedea0SLionel SambucCA certificate corresponding to the revocation information in B<indexfile>.
251ebfedea0SLionel Sambuc
252ebfedea0SLionel Sambuc=item B<-rsigner file>
253ebfedea0SLionel Sambuc
254ebfedea0SLionel SambucThe certificate to sign OCSP responses with.
255ebfedea0SLionel Sambuc
256ebfedea0SLionel Sambuc=item B<-rother file>
257ebfedea0SLionel Sambuc
258ebfedea0SLionel SambucAdditional certificates to include in the OCSP response.
259ebfedea0SLionel Sambuc
260ebfedea0SLionel Sambuc=item B<-resp_no_certs>
261ebfedea0SLionel Sambuc
262ebfedea0SLionel SambucDon't include any certificates in the OCSP response.
263ebfedea0SLionel Sambuc
264ebfedea0SLionel Sambuc=item B<-resp_key_id>
265ebfedea0SLionel Sambuc
266ebfedea0SLionel SambucIdentify the signer certificate using the key ID, default is to use the subject name.
267ebfedea0SLionel Sambuc
268ebfedea0SLionel Sambuc=item B<-rkey file>
269ebfedea0SLionel Sambuc
270ebfedea0SLionel SambucThe private key to sign OCSP responses with: if not present the file specified in the
271ebfedea0SLionel SambucB<rsigner> option is used.
272ebfedea0SLionel Sambuc
273ebfedea0SLionel Sambuc=item B<-port portnum>
274ebfedea0SLionel Sambuc
275ebfedea0SLionel SambucPort to listen for OCSP requests on. The port may also be specified using the B<url>
276ebfedea0SLionel Sambucoption.
277ebfedea0SLionel Sambuc
278ebfedea0SLionel Sambuc=item B<-nrequest number>
279ebfedea0SLionel Sambuc
280ebfedea0SLionel SambucThe OCSP server will exit after receiving B<number> requests, default unlimited.
281ebfedea0SLionel Sambuc
282ebfedea0SLionel Sambuc=item B<-nmin minutes>, B<-ndays days>
283ebfedea0SLionel Sambuc
284ebfedea0SLionel SambucNumber of minutes or days when fresh revocation information is available: used in the
285ebfedea0SLionel SambucB<nextUpdate> field. If neither option is present then the B<nextUpdate> field is
286ebfedea0SLionel Sambucomitted meaning fresh revocation information is immediately available.
287ebfedea0SLionel Sambuc
288ebfedea0SLionel Sambuc=back
289ebfedea0SLionel Sambuc
290ebfedea0SLionel Sambuc=head1 OCSP Response verification.
291ebfedea0SLionel Sambuc
292ebfedea0SLionel SambucOCSP Response follows the rules specified in RFC2560.
293ebfedea0SLionel Sambuc
294ebfedea0SLionel SambucInitially the OCSP responder certificate is located and the signature on
295ebfedea0SLionel Sambucthe OCSP request checked using the responder certificate's public key.
296ebfedea0SLionel Sambuc
297ebfedea0SLionel SambucThen a normal certificate verify is performed on the OCSP responder certificate
298ebfedea0SLionel Sambucbuilding up a certificate chain in the process. The locations of the trusted
299ebfedea0SLionel Sambuccertificates used to build the chain can be specified by the B<CAfile>
300ebfedea0SLionel Sambucand B<CApath> options or they will be looked for in the standard OpenSSL
301ebfedea0SLionel Sambuccertificates directory.
302ebfedea0SLionel Sambuc
303ebfedea0SLionel SambucIf the initial verify fails then the OCSP verify process halts with an
304ebfedea0SLionel Sambucerror.
305ebfedea0SLionel Sambuc
306ebfedea0SLionel SambucOtherwise the issuing CA certificate in the request is compared to the OCSP
307ebfedea0SLionel Sambucresponder certificate: if there is a match then the OCSP verify succeeds.
308ebfedea0SLionel Sambuc
309ebfedea0SLionel SambucOtherwise the OCSP responder certificate's CA is checked against the issuing
310ebfedea0SLionel SambucCA certificate in the request. If there is a match and the OCSPSigning
311ebfedea0SLionel Sambucextended key usage is present in the OCSP responder certificate then the
312ebfedea0SLionel SambucOCSP verify succeeds.
313ebfedea0SLionel Sambuc
314*0a6a1f1dSLionel SambucOtherwise, if B<-no_explicit> is B<not> set the root CA of the OCSP responders
315*0a6a1f1dSLionel SambucCA is checked to see if it is trusted for OCSP signing. If it is the OCSP
316*0a6a1f1dSLionel Sambucverify succeeds.
317ebfedea0SLionel Sambuc
318ebfedea0SLionel SambucIf none of these checks is successful then the OCSP verify fails.
319ebfedea0SLionel Sambuc
320ebfedea0SLionel SambucWhat this effectively means if that if the OCSP responder certificate is
321ebfedea0SLionel Sambucauthorised directly by the CA it is issuing revocation information about
322ebfedea0SLionel Sambuc(and it is correctly configured) then verification will succeed.
323ebfedea0SLionel Sambuc
324ebfedea0SLionel SambucIf the OCSP responder is a "global responder" which can give details about
325ebfedea0SLionel Sambucmultiple CAs and has its own separate certificate chain then its root
326ebfedea0SLionel SambucCA can be trusted for OCSP signing. For example:
327ebfedea0SLionel Sambuc
328ebfedea0SLionel Sambuc openssl x509 -in ocspCA.pem -addtrust OCSPSigning -out trustedCA.pem
329ebfedea0SLionel Sambuc
330ebfedea0SLionel SambucAlternatively the responder certificate itself can be explicitly trusted
331ebfedea0SLionel Sambucwith the B<-VAfile> option.
332ebfedea0SLionel Sambuc
333ebfedea0SLionel Sambuc=head1 NOTES
334ebfedea0SLionel Sambuc
335ebfedea0SLionel SambucAs noted, most of the verify options are for testing or debugging purposes.
336ebfedea0SLionel SambucNormally only the B<-CApath>, B<-CAfile> and (if the responder is a 'global
337ebfedea0SLionel SambucVA') B<-VAfile> options need to be used.
338ebfedea0SLionel Sambuc
339ebfedea0SLionel SambucThe OCSP server is only useful for test and demonstration purposes: it is
340ebfedea0SLionel Sambucnot really usable as a full OCSP responder. It contains only a very
341ebfedea0SLionel Sambucsimple HTTP request handling and can only handle the POST form of OCSP
342ebfedea0SLionel Sambucqueries. It also handles requests serially meaning it cannot respond to
343ebfedea0SLionel Sambucnew requests until it has processed the current one. The text index file
344ebfedea0SLionel Sambucformat of revocation is also inefficient for large quantities of revocation
345ebfedea0SLionel Sambucdata.
346ebfedea0SLionel Sambuc
347ebfedea0SLionel SambucIt is possible to run the B<ocsp> application in responder mode via a CGI
348ebfedea0SLionel Sambucscript using the B<respin> and B<respout> options.
349ebfedea0SLionel Sambuc
350ebfedea0SLionel Sambuc=head1 EXAMPLES
351ebfedea0SLionel Sambuc
352ebfedea0SLionel SambucCreate an OCSP request and write it to a file:
353ebfedea0SLionel Sambuc
354ebfedea0SLionel Sambuc openssl ocsp -issuer issuer.pem -cert c1.pem -cert c2.pem -reqout req.der
355ebfedea0SLionel Sambuc
356ebfedea0SLionel SambucSend a query to an OCSP responder with URL http://ocsp.myhost.com/ save the
357ebfedea0SLionel Sambucresponse to a file and print it out in text form
358ebfedea0SLionel Sambuc
359ebfedea0SLionel Sambuc openssl ocsp -issuer issuer.pem -cert c1.pem -cert c2.pem \
360ebfedea0SLionel Sambuc     -url http://ocsp.myhost.com/ -resp_text -respout resp.der
361ebfedea0SLionel Sambuc
362ebfedea0SLionel SambucRead in an OCSP response and print out text form:
363ebfedea0SLionel Sambuc
364ebfedea0SLionel Sambuc openssl ocsp -respin resp.der -text
365ebfedea0SLionel Sambuc
366ebfedea0SLionel SambucOCSP server on port 8888 using a standard B<ca> configuration, and a separate
367ebfedea0SLionel Sambucresponder certificate. All requests and responses are printed to a file.
368ebfedea0SLionel Sambuc
369ebfedea0SLionel Sambuc openssl ocsp -index demoCA/index.txt -port 8888 -rsigner rcert.pem -CA demoCA/cacert.pem
370ebfedea0SLionel Sambuc	-text -out log.txt
371ebfedea0SLionel Sambuc
372ebfedea0SLionel SambucAs above but exit after processing one request:
373ebfedea0SLionel Sambuc
374ebfedea0SLionel Sambuc openssl ocsp -index demoCA/index.txt -port 8888 -rsigner rcert.pem -CA demoCA/cacert.pem
375ebfedea0SLionel Sambuc     -nrequest 1
376ebfedea0SLionel Sambuc
377ebfedea0SLionel SambucQuery status information using internally generated request:
378ebfedea0SLionel Sambuc
379ebfedea0SLionel Sambuc openssl ocsp -index demoCA/index.txt -rsigner rcert.pem -CA demoCA/cacert.pem
380ebfedea0SLionel Sambuc     -issuer demoCA/cacert.pem -serial 1
381ebfedea0SLionel Sambuc
382ebfedea0SLionel SambucQuery status information using request read from a file, write response to a
383ebfedea0SLionel Sambucsecond file.
384ebfedea0SLionel Sambuc
385ebfedea0SLionel Sambuc openssl ocsp -index demoCA/index.txt -rsigner rcert.pem -CA demoCA/cacert.pem
386ebfedea0SLionel Sambuc     -reqin req.der -respout resp.der
387*0a6a1f1dSLionel Sambuc
388*0a6a1f1dSLionel Sambuc=head1 HISTORY
389*0a6a1f1dSLionel Sambuc
390*0a6a1f1dSLionel SambucThe -no_alt_chains options was first added to OpenSSL 1.0.1n and 1.0.2b.
391*0a6a1f1dSLionel Sambuc
392*0a6a1f1dSLionel Sambuc=cut
393