1=pod 2 3=head1 NAME 4 5nseq - create or examine a netscape certificate sequence 6 7=head1 SYNOPSIS 8 9B<openssl> B<nseq> 10[B<-in filename>] 11[B<-out filename>] 12[B<-toseq>] 13 14=head1 DESCRIPTION 15 16The B<nseq> command takes a file containing a Netscape certificate 17sequence and prints out the certificates contained in it or takes a 18file of certificates and converts it into a Netscape certificate 19sequence. 20 21=head1 COMMAND OPTIONS 22 23=over 4 24 25=item B<-in filename> 26 27This specifies the input filename to read or standard input if this 28option is not specified. 29 30=item B<-out filename> 31 32specifies the output filename or standard output by default. 33 34=item B<-toseq> 35 36normally a Netscape certificate sequence will be input and the output 37is the certificates contained in it. With the B<-toseq> option the 38situation is reversed: a Netscape certificate sequence is created from 39a file of certificates. 40 41=back 42 43=head1 EXAMPLES 44 45Output the certificates in a Netscape certificate sequence 46 47 openssl nseq -in nseq.pem -out certs.pem 48 49Create a Netscape certificate sequence 50 51 openssl nseq -in certs.pem -toseq -out nseq.pem 52 53=head1 NOTES 54 55The B<PEM> encoded form uses the same headers and footers as a certificate: 56 57 -----BEGIN CERTIFICATE----- 58 -----END CERTIFICATE----- 59 60A Netscape certificate sequence is a Netscape specific form that can be sent 61to browsers as an alternative to the standard PKCS#7 format when several 62certificates are sent to the browser: for example during certificate enrollment. 63It is used by Netscape certificate server for example. 64 65=head1 BUGS 66 67This program needs a few more options: like allowing DER or PEM input and 68output files and allowing multiple certificate files to be used. 69 70=cut 71