nseq.pod revision 325337
1=pod
2
3=head1 NAME
4
5openssl-nseq,
6nseq - create or examine a netscape certificate sequence
7
8=head1 SYNOPSIS
9
10B<openssl> B<nseq>
11[B<-in filename>]
12[B<-out filename>]
13[B<-toseq>]
14
15=head1 DESCRIPTION
16
17The B<nseq> command takes a file containing a Netscape certificate
18sequence and prints out the certificates contained in it or takes a
19file of certificates and converts it into a Netscape certificate
20sequence.
21
22=head1 COMMAND OPTIONS
23
24=over 4
25
26=item B<-in filename>
27
28This specifies the input filename to read or standard input if this
29option is not specified.
30
31=item B<-out filename>
32
33specifies the output filename or standard output by default.
34
35=item B<-toseq>
36
37normally a Netscape certificate sequence will be input and the output
38is the certificates contained in it. With the B<-toseq> option the
39situation is reversed: a Netscape certificate sequence is created from
40a file of certificates.
41
42=back
43
44=head1 EXAMPLES
45
46Output the certificates in a Netscape certificate sequence
47
48 openssl nseq -in nseq.pem -out certs.pem
49
50Create a Netscape certificate sequence
51
52 openssl nseq -in certs.pem -toseq -out nseq.pem
53
54=head1 NOTES
55
56The B<PEM> encoded form uses the same headers and footers as a certificate:
57
58 -----BEGIN CERTIFICATE-----
59 -----END CERTIFICATE-----
60
61A Netscape certificate sequence is a Netscape specific form that can be sent
62to browsers as an alternative to the standard PKCS#7 format when several
63certificates are sent to the browser: for example during certificate enrollment.
64It is used by Netscape certificate server for example.
65
66=head1 BUGS
67
68This program needs a few more options: like allowing DER or PEM input and
69output files and allowing multiple certificate files to be used.
70
71=cut
72