| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150 | 
							- =pod
 
- {- OpenSSL::safe::output_do_not_edit_headers(); -}
 
- =head1 NAME
 
- openssl-verify - certificate verification command
 
- =head1 SYNOPSIS
 
- B<openssl> B<verify>
 
- [B<-help>]
 
- [B<-CRLfile> I<filename>|I<uri>]
 
- [B<-crl_download>]
 
- [B<-show_chain>]
 
- [B<-verbose>]
 
- [B<-trusted> I<filename>|I<uri>]
 
- [B<-untrusted> I<filename>|I<uri>]
 
- [B<-vfyopt> I<nm>:I<v>]
 
- {- $OpenSSL::safe::opt_name_synopsis -}
 
- {- $OpenSSL::safe::opt_trust_synopsis -}
 
- {- $OpenSSL::safe::opt_engine_synopsis -}{- $OpenSSL::safe::opt_v_synopsis -}
 
- {- $OpenSSL::safe::opt_provider_synopsis -}
 
- [B<-->]
 
- [I<certificate> ...]
 
- =head1 DESCRIPTION
 
- This command verifies certificate chains. If a certificate chain has multiple
 
- problems, this program attempts to display all of them.
 
- =head1 OPTIONS
 
- =over 4
 
- =item B<-help>
 
- Print out a usage message.
 
- =item B<-CRLfile> I<filename>|I<uri>
 
- The file or URI should contain one or more CRLs in PEM or DER format.
 
- This option can be specified more than once to include CRLs from multiple
 
- sources.
 
- =item B<-crl_download>
 
- Attempt to download CRL information for certificates via their CDP entries.
 
- =item B<-show_chain>
 
- Display information about the certificate chain that has been built (if
 
- successful). Certificates in the chain that came from the untrusted list will be
 
- flagged as "untrusted".
 
- =item B<-verbose>
 
- Print extra information about the operations being performed.
 
- =item B<-trusted> I<filename>|I<uri>
 
- A file or URI of (more or less) trusted certificates.
 
- See L<openssl-verification-options(1)> for more information on trust settings.
 
- This option can be specified more than once to load certificates from multiple
 
- sources.
 
- =item B<-untrusted> I<filename>|I<uri>
 
- A file or URI of untrusted certificates to use for chain building.
 
- This option can be specified more than once to load certificates from multiple
 
- sources.
 
- =item B<-vfyopt> I<nm>:I<v>
 
- Pass options to the signature algorithm during verify operations.
 
- Names and values of these options are algorithm-specific.
 
- {- $OpenSSL::safe::opt_name_item -}
 
- {- $OpenSSL::safe::opt_engine_item -}
 
- {- output_off() if $disabled{"deprecated-3.0"}; "" -}
 
- To load certificates or CRLs that require engine support, specify the
 
- B<-engine> option before any of the
 
- B<-trusted>, B<-untrusted> or B<-CRLfile> options.
 
- {- output_on() if $disabled{"deprecated-3.0"}; "" -}
 
- {- $OpenSSL::safe::opt_trust_item -}
 
- {- $OpenSSL::safe::opt_v_item -}
 
- {- $OpenSSL::safe::opt_provider_item -}
 
- =item B<-->
 
- Indicates the last option. All arguments following this are assumed to be
 
- certificate files. This is useful if the first certificate filename begins
 
- with a B<->.
 
- =item I<certificate> ...
 
- One or more target certificates to verify, one per file. If no certificates are
 
- given, this command will attempt to read a single certificate from standard
 
- input.
 
- =back
 
- =head1 DIAGNOSTICS
 
- When a verify operation fails the output messages can be somewhat cryptic. The
 
- general form of the error message is:
 
-  server.pem: /C=AU/ST=Queensland/O=CryptSoft Pty Ltd/CN=Test CA (1024 bit)
 
-  error 24 at 1 depth lookup:invalid CA certificate
 
- The first line contains the name of the certificate being verified followed by
 
- the subject name of the certificate. The second line contains the error number
 
- and the depth. The depth is number of the certificate being verified when a
 
- problem was detected starting with zero for the target ("leaf") certificate
 
- itself then 1 for the CA that signed the target certificate and so on.
 
- Finally a textual version of the error number is presented.
 
- A list of the error codes and messages can be found in
 
- L<X509_STORE_CTX_get_error(3)>; the full list is defined in the header file
 
- F<< <openssl/x509_vfy.h> >>.
 
- This command ignores many errors, in order to allow all the problems with a
 
- certificate chain to be determined.
 
- =head1 SEE ALSO
 
- L<openssl-verification-options(1)>,
 
- L<openssl-x509(1)>,
 
- L<ossl_store-file(7)>
 
- =head1 HISTORY
 
- The B<-show_chain> option was added in OpenSSL 1.1.0.
 
- The B<-engine option> was deprecated in OpenSSL 3.0.
 
- =head1 COPYRIGHT
 
- Copyright 2000-2021 The OpenSSL Project Authors. All Rights Reserved.
 
- Licensed under the Apache License 2.0 (the "License").  You may not use
 
- this file except in compliance with the License.  You can obtain a copy
 
- in the file LICENSE in the source distribution or at
 
- L<https://www.openssl.org/source/license.html>.
 
- =cut
 
 
  |