openssl smime -help



  • S/MIME mail processing.

    $ openssl smime -help
    Usage: smime [options] cert.pem...
      cert.pem... recipient certs for encryption
    Valid options are:
     -help                 Display this summary
     -encrypt              Encrypt message
     -decrypt              Decrypt encrypted message
     -sign                 Sign message
     -verify               Verify signed message
     -pk7out               Output PKCS#7 structure
     -nointern             Don't search certificates in message for signer
     -nosigs               Don't verify message signature
     -noverify             Don't verify signers certificate
     -nocerts              Don't include signers certificate when signing
     -nodetach             Use opaque signing
     -noattr               Don't include any signed attributes
     -binary               Don't translate message to text
     -certfile infile      Other certificates file
     -signer val           Signer certificate file
     -recip infile         Recipient certificate file for decryption
     -in infile            Input file
     -inform parm          Input format SMIME (default), PEM or DER
     -inkey val            Input private key (if not signer or recipient)
     -keyform format       Input private key format (PEM or ENGINE)
     -out outfile          Output file
     -outform parm         Output format SMIME (default), PEM or DER
     -content infile       Supply or override content for detached signature
     -to val               To address
     -from val             From address
     -subject val          Subject
     -text                 Include or delete text MIME headers
     -CApath dir           Trusted certificates directory
     -CAfile infile        Trusted certificates file
     -no-CAfile            Do not load the default certificates file
     -no-CApath            Do not load certificates from the default certificates directory
     -resign               Resign a signed message
     -nochain              set PKCS7_NOCHAIN so certificates contained in the message are not used as untrusted CAs
     -nosmimecap           Omit the SMIMECapabilities attribute
     -stream               Enable CMS streaming
     -indef                Same as -stream
     -noindef              Disable CMS streaming
     -crlfeol              Use CRLF as EOL termination instead of CR only
     -rand val             Load the file(s) into the random number generator
     -writerand outfile    Write random data to the specified file
     -passin val           Input file pass phrase source
     -md val               Digest algorithm to use when signing or resigning
     -*                    Any supported cipher
     -policy val           adds policy to the acceptable policy set
     -purpose val          certificate chain purpose
     -verify_name val      verification policy name
     -verify_depth int     chain depth limit
     -auth_level int       chain authentication security level
     -attime intmax        verification epoch time
     -verify_hostname val  expected peer hostname
     -verify_email val     expected peer email
     -verify_ip val        expected peer IP address
     -ignore_critical      permit unhandled critical extensions
     -issuer_checks        (deprecated)
     -crl_check            check leaf certificate revocation
     -crl_check_all        check full chain revocation
     -policy_check         perform rfc5280 policy checks
     -explicit_policy      set policy variable require-explicit-policy
     -inhibit_any          set policy variable inhibit-any-policy
     -inhibit_map          set policy variable inhibit-policy-mapping
     -x509_strict          disable certificate compatibility work-arounds
     -extended_crl         enable extended CRL features
     -use_deltas           use delta CRLs
     -policy_print         print policy processing diagnostics
     -check_ss_sig         check root CA self-signatures
     -trusted_first        search trust store first (default)
     -suiteB_128_only      Suite B 128-bit-only mode
     -suiteB_128           Suite B 128-bit mode allowing 192-bit algorithms
     -suiteB_192           Suite B 192-bit-only mode
     -partial_chain        accept chains anchored by intermediate trust-store CAs
     -no_alt_chains        (deprecated)
     -no_check_time        ignore certificate validity time
     -allow_proxy_certs    allow the use of proxy certificates
     -engine val           Use engine, possibly a hardware device
    

Log in to reply
 

© Lightnetics 2024