1ebfedea0SLionel Sambuc=pod 2ebfedea0SLionel Sambuc 3ebfedea0SLionel Sambuc=head1 NAME 4ebfedea0SLionel Sambuc 5ebfedea0SLionel Sambucocsp - Online Certificate Status Protocol utility 6ebfedea0SLionel Sambuc 7ebfedea0SLionel Sambuc=head1 SYNOPSIS 8ebfedea0SLionel Sambuc 9ebfedea0SLionel SambucB<openssl> B<ocsp> 10ebfedea0SLionel Sambuc[B<-out file>] 11ebfedea0SLionel Sambuc[B<-issuer file>] 12ebfedea0SLionel Sambuc[B<-cert file>] 13ebfedea0SLionel Sambuc[B<-serial n>] 14ebfedea0SLionel Sambuc[B<-signer file>] 15ebfedea0SLionel Sambuc[B<-signkey file>] 16ebfedea0SLionel Sambuc[B<-sign_other file>] 17ebfedea0SLionel Sambuc[B<-no_certs>] 18ebfedea0SLionel Sambuc[B<-req_text>] 19ebfedea0SLionel Sambuc[B<-resp_text>] 20ebfedea0SLionel Sambuc[B<-text>] 21ebfedea0SLionel Sambuc[B<-reqout file>] 22ebfedea0SLionel Sambuc[B<-respout file>] 23ebfedea0SLionel Sambuc[B<-reqin file>] 24ebfedea0SLionel Sambuc[B<-respin file>] 25ebfedea0SLionel Sambuc[B<-nonce>] 26ebfedea0SLionel Sambuc[B<-no_nonce>] 27ebfedea0SLionel Sambuc[B<-url URL>] 28ebfedea0SLionel Sambuc[B<-host host:n>] 29ebfedea0SLionel Sambuc[B<-path>] 30ebfedea0SLionel Sambuc[B<-CApath dir>] 31ebfedea0SLionel Sambuc[B<-CAfile file>] 32*0a6a1f1dSLionel Sambuc[B<-no_alt_chains>]] 33ebfedea0SLionel Sambuc[B<-VAfile file>] 34ebfedea0SLionel Sambuc[B<-validity_period n>] 35ebfedea0SLionel Sambuc[B<-status_age n>] 36ebfedea0SLionel Sambuc[B<-noverify>] 37ebfedea0SLionel Sambuc[B<-verify_other file>] 38ebfedea0SLionel Sambuc[B<-trust_other>] 39ebfedea0SLionel Sambuc[B<-no_intern>] 40ebfedea0SLionel Sambuc[B<-no_signature_verify>] 41ebfedea0SLionel Sambuc[B<-no_cert_verify>] 42ebfedea0SLionel Sambuc[B<-no_chain>] 43ebfedea0SLionel Sambuc[B<-no_cert_checks>] 44*0a6a1f1dSLionel Sambuc[B<-no_explicit>] 45ebfedea0SLionel Sambuc[B<-port num>] 46ebfedea0SLionel Sambuc[B<-index file>] 47ebfedea0SLionel Sambuc[B<-CA file>] 48ebfedea0SLionel Sambuc[B<-rsigner file>] 49ebfedea0SLionel Sambuc[B<-rkey file>] 50ebfedea0SLionel Sambuc[B<-rother file>] 51ebfedea0SLionel Sambuc[B<-resp_no_certs>] 52ebfedea0SLionel Sambuc[B<-nmin n>] 53ebfedea0SLionel Sambuc[B<-ndays n>] 54ebfedea0SLionel Sambuc[B<-resp_key_id>] 55ebfedea0SLionel Sambuc[B<-nrequest n>] 56ebfedea0SLionel Sambuc[B<-md5|-sha1|...>] 57ebfedea0SLionel Sambuc 58ebfedea0SLionel Sambuc=head1 DESCRIPTION 59ebfedea0SLionel Sambuc 60ebfedea0SLionel SambucThe Online Certificate Status Protocol (OCSP) enables applications to 61ebfedea0SLionel Sambucdetermine the (revocation) state of an identified certificate (RFC 2560). 62ebfedea0SLionel Sambuc 63ebfedea0SLionel SambucThe B<ocsp> command performs many common OCSP tasks. It can be used 64ebfedea0SLionel Sambucto print out requests and responses, create requests and send queries 65ebfedea0SLionel Sambucto an OCSP responder and behave like a mini OCSP server itself. 66ebfedea0SLionel Sambuc 67ebfedea0SLionel Sambuc=head1 OCSP CLIENT OPTIONS 68ebfedea0SLionel Sambuc 69ebfedea0SLionel Sambuc=over 4 70ebfedea0SLionel Sambuc 71ebfedea0SLionel Sambuc=item B<-out filename> 72ebfedea0SLionel Sambuc 73ebfedea0SLionel Sambucspecify output filename, default is standard output. 74ebfedea0SLionel Sambuc 75ebfedea0SLionel Sambuc=item B<-issuer filename> 76ebfedea0SLionel Sambuc 77ebfedea0SLionel SambucThis specifies the current issuer certificate. This option can be used 78ebfedea0SLionel Sambucmultiple times. The certificate specified in B<filename> must be in 79ebfedea0SLionel SambucPEM format. This option B<MUST> come before any B<-cert> options. 80ebfedea0SLionel Sambuc 81ebfedea0SLionel Sambuc=item B<-cert filename> 82ebfedea0SLionel Sambuc 83ebfedea0SLionel SambucAdd the certificate B<filename> to the request. The issuer certificate 84ebfedea0SLionel Sambucis taken from the previous B<issuer> option, or an error occurs if no 85ebfedea0SLionel Sambucissuer certificate is specified. 86ebfedea0SLionel Sambuc 87ebfedea0SLionel Sambuc=item B<-serial num> 88ebfedea0SLionel Sambuc 89ebfedea0SLionel SambucSame as the B<cert> option except the certificate with serial number 90ebfedea0SLionel SambucB<num> is added to the request. The serial number is interpreted as a 91ebfedea0SLionel Sambucdecimal integer unless preceded by B<0x>. Negative integers can also 92ebfedea0SLionel Sambucbe specified by preceding the value by a B<-> sign. 93ebfedea0SLionel Sambuc 94ebfedea0SLionel Sambuc=item B<-signer filename>, B<-signkey filename> 95ebfedea0SLionel Sambuc 96ebfedea0SLionel SambucSign the OCSP request using the certificate specified in the B<signer> 97ebfedea0SLionel Sambucoption and the private key specified by the B<signkey> option. If 98ebfedea0SLionel Sambucthe B<signkey> option is not present then the private key is read 99ebfedea0SLionel Sambucfrom the same file as the certificate. If neither option is specified then 100ebfedea0SLionel Sambucthe OCSP request is not signed. 101ebfedea0SLionel Sambuc 102ebfedea0SLionel Sambuc=item B<-sign_other filename> 103ebfedea0SLionel Sambuc 104ebfedea0SLionel SambucAdditional certificates to include in the signed request. 105ebfedea0SLionel Sambuc 106ebfedea0SLionel Sambuc=item B<-nonce>, B<-no_nonce> 107ebfedea0SLionel Sambuc 108ebfedea0SLionel SambucAdd an OCSP nonce extension to a request or disable OCSP nonce addition. 109ebfedea0SLionel SambucNormally if an OCSP request is input using the B<respin> option no 110ebfedea0SLionel Sambucnonce is added: using the B<nonce> option will force addition of a nonce. 111ebfedea0SLionel SambucIf an OCSP request is being created (using B<cert> and B<serial> options) 112ebfedea0SLionel Sambuca nonce is automatically added specifying B<no_nonce> overrides this. 113ebfedea0SLionel Sambuc 114ebfedea0SLionel Sambuc=item B<-req_text>, B<-resp_text>, B<-text> 115ebfedea0SLionel Sambuc 116ebfedea0SLionel Sambucprint out the text form of the OCSP request, response or both respectively. 117ebfedea0SLionel Sambuc 118ebfedea0SLionel Sambuc=item B<-reqout file>, B<-respout file> 119ebfedea0SLionel Sambuc 120ebfedea0SLionel Sambucwrite out the DER encoded certificate request or response to B<file>. 121ebfedea0SLionel Sambuc 122ebfedea0SLionel Sambuc=item B<-reqin file>, B<-respin file> 123ebfedea0SLionel Sambuc 124ebfedea0SLionel Sambucread OCSP request or response file from B<file>. These option are ignored 125ebfedea0SLionel Sambucif OCSP request or response creation is implied by other options (for example 126ebfedea0SLionel Sambucwith B<serial>, B<cert> and B<host> options). 127ebfedea0SLionel Sambuc 128ebfedea0SLionel Sambuc=item B<-url responder_url> 129ebfedea0SLionel Sambuc 130ebfedea0SLionel Sambucspecify the responder URL. Both HTTP and HTTPS (SSL/TLS) URLs can be specified. 131ebfedea0SLionel Sambuc 132ebfedea0SLionel Sambuc=item B<-host hostname:port>, B<-path pathname> 133ebfedea0SLionel Sambuc 134ebfedea0SLionel Sambucif the B<host> option is present then the OCSP request is sent to the host 135ebfedea0SLionel SambucB<hostname> on port B<port>. B<path> specifies the HTTP path name to use 136ebfedea0SLionel Sambucor "/" by default. 137ebfedea0SLionel Sambuc 138*0a6a1f1dSLionel Sambuc=item B<-timeout seconds> 139*0a6a1f1dSLionel Sambuc 140*0a6a1f1dSLionel Sambucconnection timeout to the OCSP responder in seconds 141*0a6a1f1dSLionel Sambuc 142ebfedea0SLionel Sambuc=item B<-CAfile file>, B<-CApath pathname> 143ebfedea0SLionel Sambuc 144ebfedea0SLionel Sambucfile or pathname containing trusted CA certificates. These are used to verify 145ebfedea0SLionel Sambucthe signature on the OCSP response. 146ebfedea0SLionel Sambuc 147*0a6a1f1dSLionel Sambuc=item B<-no_alt_chains> 148*0a6a1f1dSLionel Sambuc 149*0a6a1f1dSLionel SambucSee L<B<verify>|verify(1)> manual page for details. 150*0a6a1f1dSLionel Sambuc 151ebfedea0SLionel Sambuc=item B<-verify_other file> 152ebfedea0SLionel Sambuc 153ebfedea0SLionel Sambucfile containing additional certificates to search when attempting to locate 154ebfedea0SLionel Sambucthe OCSP response signing certificate. Some responders omit the actual signer's 155ebfedea0SLionel Sambuccertificate from the response: this option can be used to supply the necessary 156ebfedea0SLionel Sambuccertificate in such cases. 157ebfedea0SLionel Sambuc 158ebfedea0SLionel Sambuc=item B<-trust_other> 159ebfedea0SLionel Sambuc 160ebfedea0SLionel Sambucthe certificates specified by the B<-verify_other> option should be explicitly 161ebfedea0SLionel Sambuctrusted and no additional checks will be performed on them. This is useful 162ebfedea0SLionel Sambucwhen the complete responder certificate chain is not available or trusting a 163ebfedea0SLionel Sambucroot CA is not appropriate. 164ebfedea0SLionel Sambuc 165ebfedea0SLionel Sambuc=item B<-VAfile file> 166ebfedea0SLionel Sambuc 167ebfedea0SLionel Sambucfile containing explicitly trusted responder certificates. Equivalent to the 168ebfedea0SLionel SambucB<-verify_other> and B<-trust_other> options. 169ebfedea0SLionel Sambuc 170ebfedea0SLionel Sambuc=item B<-noverify> 171ebfedea0SLionel Sambuc 172ebfedea0SLionel Sambucdon't attempt to verify the OCSP response signature or the nonce values. This 173ebfedea0SLionel Sambucoption will normally only be used for debugging since it disables all verification 174ebfedea0SLionel Sambucof the responders certificate. 175ebfedea0SLionel Sambuc 176ebfedea0SLionel Sambuc=item B<-no_intern> 177ebfedea0SLionel Sambuc 178ebfedea0SLionel Sambucignore certificates contained in the OCSP response when searching for the 179ebfedea0SLionel Sambucsigners certificate. With this option the signers certificate must be specified 180ebfedea0SLionel Sambucwith either the B<-verify_other> or B<-VAfile> options. 181ebfedea0SLionel Sambuc 182ebfedea0SLionel Sambuc=item B<-no_signature_verify> 183ebfedea0SLionel Sambuc 184ebfedea0SLionel Sambucdon't check the signature on the OCSP response. Since this option tolerates invalid 185ebfedea0SLionel Sambucsignatures on OCSP responses it will normally only be used for testing purposes. 186ebfedea0SLionel Sambuc 187ebfedea0SLionel Sambuc=item B<-no_cert_verify> 188ebfedea0SLionel Sambuc 189ebfedea0SLionel Sambucdon't verify the OCSP response signers certificate at all. Since this option allows 190ebfedea0SLionel Sambucthe OCSP response to be signed by any certificate it should only be used for 191ebfedea0SLionel Sambuctesting purposes. 192ebfedea0SLionel Sambuc 193ebfedea0SLionel Sambuc=item B<-no_chain> 194ebfedea0SLionel Sambuc 195ebfedea0SLionel Sambucdo not use certificates in the response as additional untrusted CA 196ebfedea0SLionel Sambuccertificates. 197ebfedea0SLionel Sambuc 198*0a6a1f1dSLionel Sambuc=item B<-no_explicit> 199*0a6a1f1dSLionel Sambuc 200*0a6a1f1dSLionel Sambucdo not explicitly trust the root CA if it is set to be trusted for OCSP signing. 201*0a6a1f1dSLionel Sambuc 202ebfedea0SLionel Sambuc=item B<-no_cert_checks> 203ebfedea0SLionel Sambuc 204ebfedea0SLionel Sambucdon't perform any additional checks on the OCSP response signers certificate. 205ebfedea0SLionel SambucThat is do not make any checks to see if the signers certificate is authorised 206ebfedea0SLionel Sambucto provide the necessary status information: as a result this option should 207ebfedea0SLionel Sambuconly be used for testing purposes. 208ebfedea0SLionel Sambuc 209ebfedea0SLionel Sambuc=item B<-validity_period nsec>, B<-status_age age> 210ebfedea0SLionel Sambuc 211ebfedea0SLionel Sambucthese options specify the range of times, in seconds, which will be tolerated 212ebfedea0SLionel Sambucin an OCSP response. Each certificate status response includes a B<notBefore> time and 213ebfedea0SLionel Sambucan optional B<notAfter> time. The current time should fall between these two values, but 214ebfedea0SLionel Sambucthe interval between the two times may be only a few seconds. In practice the OCSP 215ebfedea0SLionel Sambucresponder and clients clocks may not be precisely synchronised and so such a check 216ebfedea0SLionel Sambucmay fail. To avoid this the B<-validity_period> option can be used to specify an 217ebfedea0SLionel Sambucacceptable error range in seconds, the default value is 5 minutes. 218ebfedea0SLionel Sambuc 219ebfedea0SLionel SambucIf the B<notAfter> time is omitted from a response then this means that new status 220ebfedea0SLionel Sambucinformation is immediately available. In this case the age of the B<notBefore> field 221ebfedea0SLionel Sambucis checked to see it is not older than B<age> seconds old. By default this additional 222ebfedea0SLionel Sambuccheck is not performed. 223ebfedea0SLionel Sambuc 224ebfedea0SLionel Sambuc=item B<-md5|-sha1|-sha256|-ripemod160|...> 225ebfedea0SLionel Sambuc 226ebfedea0SLionel Sambucthis option sets digest algorithm to use for certificate identification 227ebfedea0SLionel Sambucin the OCSP request. By default SHA-1 is used. 228ebfedea0SLionel Sambuc 229ebfedea0SLionel Sambuc=back 230ebfedea0SLionel Sambuc 231ebfedea0SLionel Sambuc=head1 OCSP SERVER OPTIONS 232ebfedea0SLionel Sambuc 233ebfedea0SLionel Sambuc=over 4 234ebfedea0SLionel Sambuc 235ebfedea0SLionel Sambuc=item B<-index indexfile> 236ebfedea0SLionel Sambuc 237ebfedea0SLionel SambucB<indexfile> is a text index file in B<ca> format containing certificate revocation 238ebfedea0SLionel Sambucinformation. 239ebfedea0SLionel Sambuc 240ebfedea0SLionel SambucIf the B<index> option is specified the B<ocsp> utility is in responder mode, otherwise 241ebfedea0SLionel Sambucit is in client mode. The request(s) the responder processes can be either specified on 242ebfedea0SLionel Sambucthe command line (using B<issuer> and B<serial> options), supplied in a file (using the 243ebfedea0SLionel SambucB<respin> option) or via external OCSP clients (if B<port> or B<url> is specified). 244ebfedea0SLionel Sambuc 245ebfedea0SLionel SambucIf the B<index> option is present then the B<CA> and B<rsigner> options must also be 246ebfedea0SLionel Sambucpresent. 247ebfedea0SLionel Sambuc 248ebfedea0SLionel Sambuc=item B<-CA file> 249ebfedea0SLionel Sambuc 250ebfedea0SLionel SambucCA certificate corresponding to the revocation information in B<indexfile>. 251ebfedea0SLionel Sambuc 252ebfedea0SLionel Sambuc=item B<-rsigner file> 253ebfedea0SLionel Sambuc 254ebfedea0SLionel SambucThe certificate to sign OCSP responses with. 255ebfedea0SLionel Sambuc 256ebfedea0SLionel Sambuc=item B<-rother file> 257ebfedea0SLionel Sambuc 258ebfedea0SLionel SambucAdditional certificates to include in the OCSP response. 259ebfedea0SLionel Sambuc 260ebfedea0SLionel Sambuc=item B<-resp_no_certs> 261ebfedea0SLionel Sambuc 262ebfedea0SLionel SambucDon't include any certificates in the OCSP response. 263ebfedea0SLionel Sambuc 264ebfedea0SLionel Sambuc=item B<-resp_key_id> 265ebfedea0SLionel Sambuc 266ebfedea0SLionel SambucIdentify the signer certificate using the key ID, default is to use the subject name. 267ebfedea0SLionel Sambuc 268ebfedea0SLionel Sambuc=item B<-rkey file> 269ebfedea0SLionel Sambuc 270ebfedea0SLionel SambucThe private key to sign OCSP responses with: if not present the file specified in the 271ebfedea0SLionel SambucB<rsigner> option is used. 272ebfedea0SLionel Sambuc 273ebfedea0SLionel Sambuc=item B<-port portnum> 274ebfedea0SLionel Sambuc 275ebfedea0SLionel SambucPort to listen for OCSP requests on. The port may also be specified using the B<url> 276ebfedea0SLionel Sambucoption. 277ebfedea0SLionel Sambuc 278ebfedea0SLionel Sambuc=item B<-nrequest number> 279ebfedea0SLionel Sambuc 280ebfedea0SLionel SambucThe OCSP server will exit after receiving B<number> requests, default unlimited. 281ebfedea0SLionel Sambuc 282ebfedea0SLionel Sambuc=item B<-nmin minutes>, B<-ndays days> 283ebfedea0SLionel Sambuc 284ebfedea0SLionel SambucNumber of minutes or days when fresh revocation information is available: used in the 285ebfedea0SLionel SambucB<nextUpdate> field. If neither option is present then the B<nextUpdate> field is 286ebfedea0SLionel Sambucomitted meaning fresh revocation information is immediately available. 287ebfedea0SLionel Sambuc 288ebfedea0SLionel Sambuc=back 289ebfedea0SLionel Sambuc 290ebfedea0SLionel Sambuc=head1 OCSP Response verification. 291ebfedea0SLionel Sambuc 292ebfedea0SLionel SambucOCSP Response follows the rules specified in RFC2560. 293ebfedea0SLionel Sambuc 294ebfedea0SLionel SambucInitially the OCSP responder certificate is located and the signature on 295ebfedea0SLionel Sambucthe OCSP request checked using the responder certificate's public key. 296ebfedea0SLionel Sambuc 297ebfedea0SLionel SambucThen a normal certificate verify is performed on the OCSP responder certificate 298ebfedea0SLionel Sambucbuilding up a certificate chain in the process. The locations of the trusted 299ebfedea0SLionel Sambuccertificates used to build the chain can be specified by the B<CAfile> 300ebfedea0SLionel Sambucand B<CApath> options or they will be looked for in the standard OpenSSL 301ebfedea0SLionel Sambuccertificates directory. 302ebfedea0SLionel Sambuc 303ebfedea0SLionel SambucIf the initial verify fails then the OCSP verify process halts with an 304ebfedea0SLionel Sambucerror. 305ebfedea0SLionel Sambuc 306ebfedea0SLionel SambucOtherwise the issuing CA certificate in the request is compared to the OCSP 307ebfedea0SLionel Sambucresponder certificate: if there is a match then the OCSP verify succeeds. 308ebfedea0SLionel Sambuc 309ebfedea0SLionel SambucOtherwise the OCSP responder certificate's CA is checked against the issuing 310ebfedea0SLionel SambucCA certificate in the request. If there is a match and the OCSPSigning 311ebfedea0SLionel Sambucextended key usage is present in the OCSP responder certificate then the 312ebfedea0SLionel SambucOCSP verify succeeds. 313ebfedea0SLionel Sambuc 314*0a6a1f1dSLionel SambucOtherwise, if B<-no_explicit> is B<not> set the root CA of the OCSP responders 315*0a6a1f1dSLionel SambucCA is checked to see if it is trusted for OCSP signing. If it is the OCSP 316*0a6a1f1dSLionel Sambucverify succeeds. 317ebfedea0SLionel Sambuc 318ebfedea0SLionel SambucIf none of these checks is successful then the OCSP verify fails. 319ebfedea0SLionel Sambuc 320ebfedea0SLionel SambucWhat this effectively means if that if the OCSP responder certificate is 321ebfedea0SLionel Sambucauthorised directly by the CA it is issuing revocation information about 322ebfedea0SLionel Sambuc(and it is correctly configured) then verification will succeed. 323ebfedea0SLionel Sambuc 324ebfedea0SLionel SambucIf the OCSP responder is a "global responder" which can give details about 325ebfedea0SLionel Sambucmultiple CAs and has its own separate certificate chain then its root 326ebfedea0SLionel SambucCA can be trusted for OCSP signing. For example: 327ebfedea0SLionel Sambuc 328ebfedea0SLionel Sambuc openssl x509 -in ocspCA.pem -addtrust OCSPSigning -out trustedCA.pem 329ebfedea0SLionel Sambuc 330ebfedea0SLionel SambucAlternatively the responder certificate itself can be explicitly trusted 331ebfedea0SLionel Sambucwith the B<-VAfile> option. 332ebfedea0SLionel Sambuc 333ebfedea0SLionel Sambuc=head1 NOTES 334ebfedea0SLionel Sambuc 335ebfedea0SLionel SambucAs noted, most of the verify options are for testing or debugging purposes. 336ebfedea0SLionel SambucNormally only the B<-CApath>, B<-CAfile> and (if the responder is a 'global 337ebfedea0SLionel SambucVA') B<-VAfile> options need to be used. 338ebfedea0SLionel Sambuc 339ebfedea0SLionel SambucThe OCSP server is only useful for test and demonstration purposes: it is 340ebfedea0SLionel Sambucnot really usable as a full OCSP responder. It contains only a very 341ebfedea0SLionel Sambucsimple HTTP request handling and can only handle the POST form of OCSP 342ebfedea0SLionel Sambucqueries. It also handles requests serially meaning it cannot respond to 343ebfedea0SLionel Sambucnew requests until it has processed the current one. The text index file 344ebfedea0SLionel Sambucformat of revocation is also inefficient for large quantities of revocation 345ebfedea0SLionel Sambucdata. 346ebfedea0SLionel Sambuc 347ebfedea0SLionel SambucIt is possible to run the B<ocsp> application in responder mode via a CGI 348ebfedea0SLionel Sambucscript using the B<respin> and B<respout> options. 349ebfedea0SLionel Sambuc 350ebfedea0SLionel Sambuc=head1 EXAMPLES 351ebfedea0SLionel Sambuc 352ebfedea0SLionel SambucCreate an OCSP request and write it to a file: 353ebfedea0SLionel Sambuc 354ebfedea0SLionel Sambuc openssl ocsp -issuer issuer.pem -cert c1.pem -cert c2.pem -reqout req.der 355ebfedea0SLionel Sambuc 356ebfedea0SLionel SambucSend a query to an OCSP responder with URL http://ocsp.myhost.com/ save the 357ebfedea0SLionel Sambucresponse to a file and print it out in text form 358ebfedea0SLionel Sambuc 359ebfedea0SLionel Sambuc openssl ocsp -issuer issuer.pem -cert c1.pem -cert c2.pem \ 360ebfedea0SLionel Sambuc -url http://ocsp.myhost.com/ -resp_text -respout resp.der 361ebfedea0SLionel Sambuc 362ebfedea0SLionel SambucRead in an OCSP response and print out text form: 363ebfedea0SLionel Sambuc 364ebfedea0SLionel Sambuc openssl ocsp -respin resp.der -text 365ebfedea0SLionel Sambuc 366ebfedea0SLionel SambucOCSP server on port 8888 using a standard B<ca> configuration, and a separate 367ebfedea0SLionel Sambucresponder certificate. All requests and responses are printed to a file. 368ebfedea0SLionel Sambuc 369ebfedea0SLionel Sambuc openssl ocsp -index demoCA/index.txt -port 8888 -rsigner rcert.pem -CA demoCA/cacert.pem 370ebfedea0SLionel Sambuc -text -out log.txt 371ebfedea0SLionel Sambuc 372ebfedea0SLionel SambucAs above but exit after processing one request: 373ebfedea0SLionel Sambuc 374ebfedea0SLionel Sambuc openssl ocsp -index demoCA/index.txt -port 8888 -rsigner rcert.pem -CA demoCA/cacert.pem 375ebfedea0SLionel Sambuc -nrequest 1 376ebfedea0SLionel Sambuc 377ebfedea0SLionel SambucQuery status information using internally generated request: 378ebfedea0SLionel Sambuc 379ebfedea0SLionel Sambuc openssl ocsp -index demoCA/index.txt -rsigner rcert.pem -CA demoCA/cacert.pem 380ebfedea0SLionel Sambuc -issuer demoCA/cacert.pem -serial 1 381ebfedea0SLionel Sambuc 382ebfedea0SLionel SambucQuery status information using request read from a file, write response to a 383ebfedea0SLionel Sambucsecond file. 384ebfedea0SLionel Sambuc 385ebfedea0SLionel Sambuc openssl ocsp -index demoCA/index.txt -rsigner rcert.pem -CA demoCA/cacert.pem 386ebfedea0SLionel Sambuc -reqin req.der -respout resp.der 387*0a6a1f1dSLionel Sambuc 388*0a6a1f1dSLionel Sambuc=head1 HISTORY 389*0a6a1f1dSLionel Sambuc 390*0a6a1f1dSLionel SambucThe -no_alt_chains options was first added to OpenSSL 1.0.1n and 1.0.2b. 391*0a6a1f1dSLionel Sambuc 392*0a6a1f1dSLionel Sambuc=cut 393