]> git.ipfire.org Git - thirdparty/openssl.git/blame - doc/man1/req.pod
Centralize documentation about config file location
[thirdparty/openssl.git] / doc / man1 / req.pod
CommitLineData
aba3e65f
DSH
1=pod
2
3=head1 NAME
4
bb9ad09e 5req - PKCS#10 certificate request and certificate generating utility
aba3e65f
DSH
6
7=head1 SYNOPSIS
8
9B<openssl> B<req>
169394d4 10[B<-help>]
aba3e65f
DSH
11[B<-inform PEM|DER>]
12[B<-outform PEM|DER>]
13[B<-in filename>]
a3fe382e 14[B<-passin arg>]
aba3e65f 15[B<-out filename>]
a3fe382e 16[B<-passout arg>]
aba3e65f 17[B<-text>]
21a85f19 18[B<-pubkey>]
aba3e65f
DSH
19[B<-noout>]
20[B<-verify>]
21[B<-modulus>]
22[B<-new>]
fb0b844a 23[B<-rand file(s)>]
aba3e65f 24[B<-newkey rsa:bits>]
49131a7d 25[B<-newkey alg:file>]
aba3e65f
DSH
26[B<-nodes>]
27[B<-key filename>]
28[B<-keyform PEM|DER>]
29[B<-keyout filename>]
e5fa864f
DSH
30[B<-keygen_engine id>]
31[B<-[digest]>]
aba3e65f 32[B<-config filename>]
57eb1d32 33[B<-multivalue-rdn>]
aba3e65f
DSH
34[B<-x509>]
35[B<-days n>]
cc5ba6a7 36[B<-set_serial n>]
8a208cba 37[B<-newhdr>]
aba3e65f
DSH
38[B<-extensions section>]
39[B<-reqexts section>]
1fc6d41b 40[B<-utf8>]
c0455cbb 41[B<-nameopt>]
e5fa864f
DSH
42[B<-reqopt>]
43[B<-subject>]
44[B<-subj arg>]
bad40585
BM
45[B<-batch>]
46[B<-verbose>]
bfa35550 47[B<-engine id>]
aba3e65f
DSH
48
49=head1 DESCRIPTION
50
51The B<req> command primarily creates and processes certificate requests
52in PKCS#10 format. It can additionally create self signed certificates
53for use as root CAs for example.
54
3dfda1a6 55=head1 OPTIONS
aba3e65f
DSH
56
57=over 4
58
169394d4
MR
59=item B<-help>
60
61Print out a usage message.
62
aba3e65f
DSH
63=item B<-inform DER|PEM>
64
65This specifies the input format. The B<DER> option uses an ASN1 DER encoded
66form compatible with the PKCS#10. The B<PEM> form is the default format: it
67consists of the B<DER> format base64 encoded with additional header and
68footer lines.
69
70=item B<-outform DER|PEM>
71
1bc74519 72This specifies the output format, the options have the same meaning as the
aba3e65f
DSH
73B<-inform> option.
74
75=item B<-in filename>
76
77This specifies the input filename to read a request from or standard input
78if this option is not specified. A request is only read if the creation
79options (B<-new> and B<-newkey>) are not specified.
80
a3fe382e 81=item B<-passin arg>
20432eae 82
a3fe382e 83the input file password source. For more information about the format of B<arg>
9b86974e 84see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)>.
20432eae 85
aba3e65f
DSH
86=item B<-out filename>
87
88This specifies the output filename to write to or standard output by
89default.
90
a3fe382e 91=item B<-passout arg>
20432eae 92
a3fe382e 93the output file password source. For more information about the format of B<arg>
9b86974e 94see the B<PASS PHRASE ARGUMENTS> section in L<openssl(1)>.
20432eae 95
aba3e65f
DSH
96=item B<-text>
97
98prints out the certificate request in text form.
99
e5fa864f
DSH
100=item B<-subject>
101
102prints out the request subject (or certificate subject if B<-x509> is
103specified)
104
21a85f19
DSH
105=item B<-pubkey>
106
107outputs the public key.
108
aba3e65f
DSH
109=item B<-noout>
110
111this option prevents output of the encoded version of the request.
112
113=item B<-modulus>
114
115this option prints out the value of the modulus of the public key
116contained in the request.
117
118=item B<-verify>
119
120verifies the signature on the request.
121
122=item B<-new>
123
124this option generates a new certificate request. It will prompt
125the user for the relevant field values. The actual fields
126prompted for and their maximum and minimum sizes are specified
127in the configuration file and any requested extensions.
128
129If the B<-key> option is not used it will generate a new RSA private
130key using information specified in the configuration file.
131
fb0b844a
RL
132=item B<-rand file(s)>
133
134a file or files containing random data used to seed the random number
9b86974e 135generator, or an EGD socket (see L<RAND_egd(3)>).
35ed393e 136Multiple files can be specified separated by an OS-dependent character.
fb0b844a
RL
137The separator is B<;> for MS-Windows, B<,> for OpenVMS, and B<:> for
138all others.
139
aba3e65f
DSH
140=item B<-newkey arg>
141
142this option creates a new certificate request and a new private
49131a7d 143key. The argument takes one of several forms. B<rsa:nbits>, where
aba3e65f 144B<nbits> is the number of bits, generates an RSA key B<nbits>
e5fa864f
DSH
145in size. If B<nbits> is omitted, i.e. B<-newkey rsa> specified,
146the default key size, specified in the configuration file is used.
147
148All other algorithms support the B<-newkey alg:file> form, where file may be
149an algorithm parameter file, created by the B<genpkey -genparam> command
4c583c36 150or and X.509 certificate for a key with appropriate algorithm.
e5fa864f
DSH
151
152B<param:file> generates a key using the parameter file or certificate B<file>,
153the algorithm is determined by the parameters. B<algname:file> use algorithm
154B<algname> and parameter file B<file>: the two algorithms must match or an
155error occurs. B<algname> just uses algorithm B<algname>, and parameters,
478b50cf 156if necessary should be specified via B<-pkeyopt> parameter.
e5fa864f
DSH
157
158B<dsa:filename> generates a DSA key using the parameters
159in the file B<filename>. B<ec:filename> generates EC key (usable both with
160ECDSA or ECDH algorithms), B<gost2001:filename> generates GOST R
16134.10-2001 key (requires B<ccgost> engine configured in the configuration
162file). If just B<gost2001> is specified a parameter set should be
163specified by B<-pkeyopt paramset:X>
164
49131a7d
DSH
165
166=item B<-pkeyopt opt:value>
167
168set the public key algorithm option B<opt> to B<value>. The precise set of
169options supported depends on the public key algorithm used and its
170implementation. See B<KEY GENERATION OPTIONS> in the B<genpkey> manual page
171for more details.
aba3e65f
DSH
172
173=item B<-key filename>
174
175This specifies the file to read the private key from. It also
176accepts PKCS#8 format private keys for PEM format files.
177
178=item B<-keyform PEM|DER>
179
180the format of the private key file specified in the B<-key>
181argument. PEM is the default.
182
183=item B<-keyout filename>
184
185this gives the filename to write the newly created private key to.
186If this option is not specified then the filename present in the
187configuration file is used.
188
189=item B<-nodes>
190
191if this option is specified then if a private key is created it
192will not be encrypted.
193
e5fa864f
DSH
194=item B<-[digest]>
195
c03726ca
RS
196this specifies the message digest to sign the request.
197Any digest supported by the OpenSSL B<dgst> command can be used.
198This overrides the digest algorithm specified in
e5fa864f 199the configuration file.
aba3e65f 200
e5fa864f
DSH
201Some public key algorithms may override this choice. For instance, DSA
202signatures always use SHA1, GOST R 34.10 signatures always use
203GOST R 34.11-94 (B<-md_gost94>).
aba3e65f
DSH
204
205=item B<-config filename>
206
e9681f83
RS
207this allows an alternative configuration file to be specified.
208Optional; for a description of the default value,
209see L<openssl(1)/COMMAND SUMMARY>.
aba3e65f 210
bad40585
BM
211=item B<-subj arg>
212
213sets subject name for new request or supersedes the subject name
214when processing a request.
c0455cbb
LJ
215The arg must be formatted as I</type0=value0/type1=value1/type2=...>,
216characters may be escaped by \ (backslash), no spaces are skipped.
bad40585 217
57eb1d32
NL
218=item B<-multivalue-rdn>
219
220this option causes the -subj argument to be interpreted with full
221support for multivalued RDNs. Example:
222
223I</DC=org/DC=OpenSSL/DC=users/UID=123456+CN=John Doe>
224
225If -multi-rdn is not used then the UID value is I<123456+CN=John Doe>.
226
aba3e65f
DSH
227=item B<-x509>
228
229this option outputs a self signed certificate instead of a certificate
230request. This is typically used to generate a test certificate or
231a self signed root CA. The extensions added to the certificate
cc5ba6a7 232(if any) are specified in the configuration file. Unless specified
3aba132d
AW
233using the B<set_serial> option, a large random number will be used for
234the serial number.
aba3e65f
DSH
235
236=item B<-days n>
237
238when the B<-x509> option is being used this specifies the number of
239days to certify the certificate for. The default is 30 days.
240
cc5ba6a7
DSH
241=item B<-set_serial n>
242
3b80e3aa 243serial number to use when outputting a self signed certificate. This
cc5ba6a7 244may be specified as a decimal value or a hex value if preceded by B<0x>.
cc5ba6a7 245
aba3e65f 246=item B<-extensions section>
fbecbc8c 247
aba3e65f
DSH
248=item B<-reqexts section>
249
250these options specify alternative sections to include certificate
251extensions (if the B<-x509> option is present) or certificate
252request extensions. This allows several different sections to
253be used in the same configuration file to specify requests for
254a variety of purposes.
255
1fc6d41b
DSH
256=item B<-utf8>
257
1bc74519 258this option causes field values to be interpreted as UTF8 strings, by
1fc6d41b
DSH
259default they are interpreted as ASCII. This means that the field
260values, whether prompted from a terminal or obtained from a
261configuration file, must be valid UTF8 strings.
262
c0455cbb
LJ
263=item B<-nameopt option>
264
265option which determines how the subject or issuer names are displayed. The
266B<option> argument can be a single option or multiple options separated by
267commas. Alternatively the B<-nameopt> switch may be used more than once to
9b86974e 268set multiple options. See the L<x509(1)> manual page for details.
c0455cbb 269
e5fa864f
DSH
270=item B<-reqopt>
271
272customise the output format used with B<-text>. The B<option> argument can be
1bc74519 273a single option or multiple options separated by commas.
e5fa864f 274
9b86974e 275See discussion of the B<-certopt> parameter in the L<x509(1)>
e5fa864f
DSH
276command.
277
8a208cba
DSH
278=item B<-newhdr>
279
2b4ffc65 280Adds the word B<NEW> to the PEM file header and footer lines on the outputted
8a208cba
DSH
281request. Some software (Netscape certificate server) and some CAs need this.
282
bad40585
BM
283=item B<-batch>
284
285non-interactive mode.
286
287=item B<-verbose>
288
289print extra details about the operations being performed.
290
bfa35550
RL
291=item B<-engine id>
292
e5fa864f 293specifying an engine (by its unique B<id> string) will cause B<req>
bfa35550
RL
294to attempt to obtain a functional reference to the specified engine,
295thus initialising it if needed. The engine will then be set as the default
296for all available algorithms.
297
e5fa864f
DSH
298=item B<-keygen_engine id>
299
300specifies an engine (by its unique B<id> string) which would be used
301for key generation operations.
302
aba3e65f
DSH
303=back
304
305=head1 CONFIGURATION FILE FORMAT
306
19d2bb57 307The configuration options are specified in the B<req> section of
aba3e65f
DSH
308the configuration file. As with all configuration files if no
309value is specified in the specific section (i.e. B<req>) then
310the initial unnamed or B<default> section is searched too.
311
312The options available are described in detail below.
313
314=over 4
315
b38f9f66
DSH
316=item B<input_password output_password>
317
318The passwords for the input private key file (if present) and
319the output private key file (if one will be created). The
a3fe382e
DSH
320command line options B<passin> and B<passout> override the
321configuration file values.
b38f9f66 322
aba3e65f
DSH
323=item B<default_bits>
324
a7626557
EK
325Specifies the default key size in bits.
326
327This option is used in conjunction with the B<-new> option to generate
328a new key. It can be overridden by specifying an explicit key size in
329the B<-newkey> option. The smallest accepted key size is 512 bits. If
330no key size is specified then 2048 bits is used.
aba3e65f
DSH
331
332=item B<default_keyfile>
333
334This is the default filename to write a private key to. If not
335specified the key is written to standard output. This can be
19d2bb57 336overridden by the B<-keyout> option.
aba3e65f
DSH
337
338=item B<oid_file>
339
340This specifies a file containing additional B<OBJECT IDENTIFIERS>.
341Each line of the file should consist of the numerical form of the
342object identifier followed by white space then the short name followed
1bc74519 343by white space and finally the long name.
aba3e65f
DSH
344
345=item B<oid_section>
346
347This specifies a section in the configuration file containing extra
5e76807b
DSH
348object identifiers. Each line should consist of the short name of the
349object identifier followed by B<=> and the numerical form. The short
aba3e65f
DSH
350and long names are the same when this option is used.
351
352=item B<RANDFILE>
353
354This specifies a filename in which random number seed information is
9b86974e 355placed and read from, or an EGD socket (see L<RAND_egd(3)>).
a4cfd178 356It is used for private key generation.
aba3e65f 357
b38f9f66 358=item B<encrypt_key>
aba3e65f
DSH
359
360If this is set to B<no> then if a private key is generated it is
361B<not> encrypted. This is equivalent to the B<-nodes> command line
6e6bc352 362option. For compatibility B<encrypt_rsa_key> is an equivalent option.
aba3e65f
DSH
363
364=item B<default_md>
365
c03726ca
RS
366This option specifies the digest algorithm to use.
367Any digest supported by the OpenSSL B<dgst> command can be used.
368If not present then MD5 is used.
369This option can be overridden on the command line.
aba3e65f 370
b38f9f66 371=item B<string_mask>
aba3e65f 372
b38f9f66
DSH
373This option masks out the use of certain string types in certain
374fields. Most users will not need to change this option.
aba3e65f
DSH
375
376It can be set to several values B<default> which is also the default
1bc74519 377option uses PrintableStrings, T61Strings and BMPStrings if the
aba3e65f
DSH
378B<pkix> value is used then only PrintableStrings and BMPStrings will
379be used. This follows the PKIX recommendation in RFC2459. If the
380B<utf8only> option is used then only UTF8Strings will be used: this
b38f9f66 381is the PKIX recommendation in RFC2459 after 2003. Finally the B<nombstr>
aba3e65f 382option just uses PrintableStrings and T61Strings: certain software has
b38f9f66 383problems with BMPStrings and UTF8Strings: in particular Netscape.
aba3e65f
DSH
384
385=item B<req_extensions>
386
387this specifies the configuration file section containing a list of
388extensions to add to the certificate request. It can be overridden
1bc74519 389by the B<-reqexts> command line switch. See the
9b86974e 390L<x509v3_config(5)> manual page for details of the
137de5b1 391extension section format.
aba3e65f
DSH
392
393=item B<x509_extensions>
394
395this specifies the configuration file section containing a list of
396extensions to add to certificate generated when the B<-x509> switch
397is used. It can be overridden by the B<-extensions> command line switch.
398
6e6bc352
DSH
399=item B<prompt>
400
401if set to the value B<no> this disables prompting of certificate fields
402and just takes values from the config file directly. It also changes the
403expected format of the B<distinguished_name> and B<attributes> sections.
404
1fc6d41b
DSH
405=item B<utf8>
406
407if set to the value B<yes> then field values to be interpreted as UTF8
408strings, by default they are interpreted as ASCII. This means that
409the field values, whether prompted from a terminal or obtained from a
410configuration file, must be valid UTF8 strings.
411
aba3e65f
DSH
412=item B<attributes>
413
414this specifies the section containing any request attributes: its format
6e6bc352
DSH
415is the same as B<distinguished_name>. Typically these may contain the
416challengePassword or unstructuredName types. They are currently ignored
417by OpenSSL's request signing utilities but some CAs might want them.
aba3e65f
DSH
418
419=item B<distinguished_name>
420
19d2bb57 421This specifies the section containing the distinguished name fields to
6e6bc352
DSH
422prompt for when generating a certificate or certificate request. The format
423is described in the next section.
424
425=back
426
427=head1 DISTINGUISHED NAME AND ATTRIBUTE SECTION FORMAT
428
429There are two separate formats for the distinguished name and attribute
430sections. If the B<prompt> option is set to B<no> then these sections
431just consist of field names and values: for example,
aba3e65f 432
6e6bc352
DSH
433 CN=My Name
434 OU=My Organization
657e60fa 435 emailAddress=someone@somewhere.org
6e6bc352
DSH
436
437This allows external programs (e.g. GUI based) to generate a template file
438with all the field names and values and just pass it to B<req>. An example
8a208cba 439of this kind of configuration file is contained in the B<EXAMPLES> section.
6e6bc352 440
8a208cba 441Alternatively if the B<prompt> option is absent or not set to B<no> then the
6e6bc352
DSH
442file contains field prompting information. It consists of lines of the form:
443
444 fieldName="prompt"
445 fieldName_default="default field value"
446 fieldName_min= 2
447 fieldName_max= 4
aba3e65f 448
20432eae 449"fieldName" is the field name being used, for example commonName (or CN).
19d2bb57 450The "prompt" string is used to ask the user to enter the relevant
aba3e65f
DSH
451details. If the user enters nothing then the default value is used if no
452default value is present then the field is omitted. A field can
453still be omitted if a default value is present if the user just
454enters the '.' character.
455
456The number of characters entered must be between the fieldName_min and
457fieldName_max limits: there may be additional restrictions based
458on the field being used (for example countryName can only ever be
459two characters long and must fit in a PrintableString).
460
461Some fields (such as organizationName) can be used more than once
462in a DN. This presents a problem because configuration files will
6e6bc352 463not recognize the same name occurring twice. To avoid this problem
8a208cba 464if the fieldName contains some characters followed by a full stop
aba3e65f
DSH
465they will be ignored. So for example a second organizationName can
466be input by calling it "1.organizationName".
467
468The actual permitted field names are any object identifier short or
469long names. These are compiled into OpenSSL and include the usual
470values such as commonName, countryName, localityName, organizationName,
208b2d54 471organizationalUnitName, stateOrProvinceName. Additionally emailAddress
8a208cba 472is include as well as name, surname, givenName initials and dnQualifier.
aba3e65f
DSH
473
474Additional object identifiers can be defined with the B<oid_file> or
475B<oid_section> options in the configuration file. Any additional fields
476will be treated as though they were a DirectoryString.
477
af29811e 478
aba3e65f
DSH
479=head1 EXAMPLES
480
481Examine and verify certificate request:
482
5e76807b 483 openssl req -in req.pem -text -verify -noout
aba3e65f
DSH
484
485Create a private key and then generate a certificate request from it:
486
740ceb5b 487 openssl genrsa -out key.pem 2048
5e76807b 488 openssl req -new -key key.pem -out req.pem
aba3e65f
DSH
489
490The same but just using req:
491
740ceb5b 492 openssl req -newkey rsa:2048 -keyout key.pem -out req.pem
aba3e65f
DSH
493
494Generate a self signed root certificate:
495
740ceb5b 496 openssl req -x509 -newkey rsa:2048 -keyout key.pem -out req.pem
5e76807b
DSH
497
498Example of a file pointed to by the B<oid_file> option:
499
1bc74519
RS
500 1.2.3.4 shortName A longer Name
501 1.2.3.6 otherName Other longer Name
5e76807b
DSH
502
503Example of a section pointed to by B<oid_section> making use of variable
504expansion:
505
506 testoid1=1.2.3.5
507 testoid2=${testoid1}.6
508
6e6bc352 509Sample configuration file prompting for field values:
5e76807b
DSH
510
511 [ req ]
1bc74519
RS
512 default_bits = 2048
513 default_keyfile = privkey.pem
514 distinguished_name = req_distinguished_name
515 attributes = req_attributes
516 req_extensions = v3_ca
5e76807b
DSH
517
518 dirstring_type = nobmp
519
520 [ req_distinguished_name ]
1bc74519
RS
521 countryName = Country Name (2 letter code)
522 countryName_default = AU
523 countryName_min = 2
524 countryName_max = 2
5e76807b 525
1bc74519 526 localityName = Locality Name (eg, city)
5e76807b 527
1bc74519 528 organizationalUnitName = Organizational Unit Name (eg, section)
5e76807b 529
1bc74519
RS
530 commonName = Common Name (eg, YOUR name)
531 commonName_max = 64
5e76807b 532
1bc74519
RS
533 emailAddress = Email Address
534 emailAddress_max = 40
5e76807b
DSH
535
536 [ req_attributes ]
1bc74519
RS
537 challengePassword = A challenge password
538 challengePassword_min = 4
539 challengePassword_max = 20
5e76807b
DSH
540
541 [ v3_ca ]
542
543 subjectKeyIdentifier=hash
544 authorityKeyIdentifier=keyid:always,issuer:always
a7be5759 545 basicConstraints = critical, CA:true
aba3e65f 546
6e6bc352
DSH
547Sample configuration containing all field values:
548
549
1bc74519 550 RANDFILE = $ENV::HOME/.rnd
6e6bc352
DSH
551
552 [ req ]
1bc74519
RS
553 default_bits = 2048
554 default_keyfile = keyfile.pem
555 distinguished_name = req_distinguished_name
556 attributes = req_attributes
557 prompt = no
558 output_password = mypass
6e6bc352
DSH
559
560 [ req_distinguished_name ]
1bc74519
RS
561 C = GB
562 ST = Test State or Province
563 L = Test Locality
564 O = Organization Name
565 OU = Organizational Unit Name
566 CN = Common Name
567 emailAddress = test@email.address
6e6bc352
DSH
568
569 [ req_attributes ]
1bc74519 570 challengePassword = A challenge password
6e6bc352
DSH
571
572
aba3e65f
DSH
573=head1 NOTES
574
8a208cba 575The header and footer lines in the B<PEM> format are normally:
0286d944 576
a8c12555
DSH
577 -----BEGIN CERTIFICATE REQUEST-----
578 -----END CERTIFICATE REQUEST-----
0286d944
DSH
579
580some software (some versions of Netscape certificate server) instead needs:
581
a8c12555
DSH
582 -----BEGIN NEW CERTIFICATE REQUEST-----
583 -----END NEW CERTIFICATE REQUEST-----
0286d944 584
8a208cba
DSH
585which is produced with the B<-newhdr> option but is otherwise compatible.
586Either form is accepted transparently on input.
aba3e65f
DSH
587
588The certificate requests generated by B<Xenroll> with MSIE have extensions
589added. It includes the B<keyUsage> extension which determines the type of
590key (signature only or general purpose) and any additional OIDs entered
591by the script in an extendedKeyUsage extension.
592
593=head1 DIAGNOSTICS
594
595The following messages are frequently asked about:
596
1bc74519
RS
597 Using configuration from /some/path/openssl.cnf
598 Unable to load config info
aba3e65f
DSH
599
600This is followed some time later by...
601
1bc74519
RS
602 unable to find 'distinguished_name' in config
603 problems making Certificate Request
aba3e65f
DSH
604
605The first error message is the clue: it can't find the configuration
606file! Certain operations (like examining a certificate request) don't
607need a configuration file so its use isn't enforced. Generation of
19d2bb57 608certificates or requests however does need a configuration file. This
aba3e65f
DSH
609could be regarded as a bug.
610
611Another puzzling message is this:
612
613 Attributes:
614 a0:00
615
616this is displayed when no attributes are present and the request includes
617the correct empty B<SET OF> structure (the DER encoding of which is 0xa0
6180x00). If you just see:
619
620 Attributes:
621
622then the B<SET OF> is missing and the encoding is technically invalid (but
623it is tolerated). See the description of the command line option B<-asn1-kludge>
624for more information.
625
aba3e65f
DSH
626=head1 BUGS
627
19d2bb57
UM
628OpenSSL's handling of T61Strings (aka TeletexStrings) is broken: it effectively
629treats them as ISO-8859-1 (Latin 1), Netscape and MSIE have similar behaviour.
aba3e65f
DSH
630This can cause problems if you need characters that aren't available in
631PrintableStrings and you don't want to or can't use BMPStrings.
632
633As a consequence of the T61String handling the only correct way to represent
634accented characters in OpenSSL is to use a BMPString: unfortunately Netscape
635currently chokes on these. If you have to use accented characters with Netscape
636and MSIE then you currently need to use the invalid T61String form.
637
6e6bc352
DSH
638The current prompting is not very friendly. It doesn't allow you to confirm what
639you've just entered. Other things like extensions in certificate requests are
640statically defined in the configuration file. Some of these: like an email
641address in subjectAltName should be input by the user.
aba3e65f
DSH
642
643=head1 SEE ALSO
644
9b86974e
RS
645L<x509(1)>, L<ca(1)>, L<genrsa(1)>,
646L<gendsa(1)>, L<config(5)>,
1bc74519 647L<x509v3_config(5)>
aba3e65f 648
e2f92610
RS
649=head1 COPYRIGHT
650
651Copyright 2000-2016 The OpenSSL Project Authors. All Rights Reserved.
652
653Licensed under the OpenSSL license (the "License"). You may not use
654this file except in compliance with the License. You can obtain a copy
655in the file LICENSE in the source distribution or at
656L<https://www.openssl.org/source/license.html>.
657
658=cut