nseq.pod revision 325337
1=pod 2 3=head1 NAME 4 5openssl-nseq, 6nseq - create or examine a netscape certificate sequence 7 8=head1 SYNOPSIS 9 10B<openssl> B<nseq> 11[B<-in filename>] 12[B<-out filename>] 13[B<-toseq>] 14 15=head1 DESCRIPTION 16 17The B<nseq> command takes a file containing a Netscape certificate 18sequence and prints out the certificates contained in it or takes a 19file of certificates and converts it into a Netscape certificate 20sequence. 21 22=head1 COMMAND OPTIONS 23 24=over 4 25 26=item B<-in filename> 27 28This specifies the input filename to read or standard input if this 29option is not specified. 30 31=item B<-out filename> 32 33specifies the output filename or standard output by default. 34 35=item B<-toseq> 36 37normally a Netscape certificate sequence will be input and the output 38is the certificates contained in it. With the B<-toseq> option the 39situation is reversed: a Netscape certificate sequence is created from 40a file of certificates. 41 42=back 43 44=head1 EXAMPLES 45 46Output the certificates in a Netscape certificate sequence 47 48 openssl nseq -in nseq.pem -out certs.pem 49 50Create a Netscape certificate sequence 51 52 openssl nseq -in certs.pem -toseq -out nseq.pem 53 54=head1 NOTES 55 56The B<PEM> encoded form uses the same headers and footers as a certificate: 57 58 -----BEGIN CERTIFICATE----- 59 -----END CERTIFICATE----- 60 61A Netscape certificate sequence is a Netscape specific form that can be sent 62to browsers as an alternative to the standard PKCS#7 format when several 63certificates are sent to the browser: for example during certificate enrollment. 64It is used by Netscape certificate server for example. 65 66=head1 BUGS 67 68This program needs a few more options: like allowing DER or PEM input and 69output files and allowing multiple certificate files to be used. 70 71=cut 72