Document "openssl s_server" -crl_check* options
Submitted by: Daniel Black <daniel.subs@internode.on.net>
This commit is contained in:
		@@ -333,6 +333,11 @@ static void sv_usage(void)
 | 
				
			|||||||
	BIO_printf(bio_err," -Verify arg   - turn on peer certificate verification, must have a cert.\n");
 | 
						BIO_printf(bio_err," -Verify arg   - turn on peer certificate verification, must have a cert.\n");
 | 
				
			||||||
	BIO_printf(bio_err," -cert arg     - certificate file to use\n");
 | 
						BIO_printf(bio_err," -cert arg     - certificate file to use\n");
 | 
				
			||||||
	BIO_printf(bio_err,"                 (default is %s)\n",TEST_CERT);
 | 
						BIO_printf(bio_err,"                 (default is %s)\n",TEST_CERT);
 | 
				
			||||||
 | 
						BIO_printf(bio_err," -crl_check    - check the peer certificate has not been revoked by its CA.\n" \
 | 
				
			||||||
 | 
						                   "                 The CRL(s) are appended to the certificate file\n");
 | 
				
			||||||
 | 
						BIO_printf(bio_err," -crl_check_all - check the peer certificate has not been revoked by its CA\n" \
 | 
				
			||||||
 | 
						                   "                 or any other CRL in the CA chain. CRL(s) are appened to the\n" \
 | 
				
			||||||
 | 
						                   "                 the certificate file.\n");
 | 
				
			||||||
	BIO_printf(bio_err," -certform arg - certificate format (PEM or DER) PEM default\n");
 | 
						BIO_printf(bio_err," -certform arg - certificate format (PEM or DER) PEM default\n");
 | 
				
			||||||
	BIO_printf(bio_err," -key arg      - Private Key file to use, in cert file if\n");
 | 
						BIO_printf(bio_err," -key arg      - Private Key file to use, in cert file if\n");
 | 
				
			||||||
	BIO_printf(bio_err,"                 not specified (default is %s)\n",TEST_CERT);
 | 
						BIO_printf(bio_err,"                 not specified (default is %s)\n",TEST_CERT);
 | 
				
			||||||
 
 | 
				
			|||||||
@@ -12,6 +12,8 @@ B<openssl> B<s_server>
 | 
				
			|||||||
[B<-context id>]
 | 
					[B<-context id>]
 | 
				
			||||||
[B<-verify depth>]
 | 
					[B<-verify depth>]
 | 
				
			||||||
[B<-Verify depth>]
 | 
					[B<-Verify depth>]
 | 
				
			||||||
 | 
					[B<-crl_check>]
 | 
				
			||||||
 | 
					[B<-crl_check_all>]
 | 
				
			||||||
[B<-cert filename>]
 | 
					[B<-cert filename>]
 | 
				
			||||||
[B<-certform DER|PEM>]
 | 
					[B<-certform DER|PEM>]
 | 
				
			||||||
[B<-key keyfile>]
 | 
					[B<-key keyfile>]
 | 
				
			||||||
@@ -142,6 +144,12 @@ the client. With the B<-verify> option a certificate is requested but the
 | 
				
			|||||||
client does not have to send one, with the B<-Verify> option the client
 | 
					client does not have to send one, with the B<-Verify> option the client
 | 
				
			||||||
must supply a certificate or an error occurs.
 | 
					must supply a certificate or an error occurs.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					=item B<-crl_check>, B<-crl_check_all>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					Check the peer certificate has not been revoked by its CA.
 | 
				
			||||||
 | 
					The CRL(s) are appended to the certificate file. With the B<-crl_check_all>
 | 
				
			||||||
 | 
					option all CRLs of all CAs in the chain are checked.
 | 
				
			||||||
 | 
					
 | 
				
			||||||
=item B<-CApath directory>
 | 
					=item B<-CApath directory>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
The directory to use for client certificate verification. This directory
 | 
					The directory to use for client certificate verification. This directory
 | 
				
			||||||
 
 | 
				
			|||||||
		Reference in New Issue
	
	Block a user