PATH:
opt
/
cpanel
/
ea-openssl11
/
share
/
doc
/
openssl
/
html
/
man1
<?xml version="1.0" ?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <title>nseq</title> <meta http-equiv="content-type" content="text/html; charset=utf-8" /> <link rev="made" href="mailto:root@localhost" /> </head> <body style="background-color: white"> <ul id="index"> <li><a href="#NAME">NAME</a></li> <li><a href="#SYNOPSIS">SYNOPSIS</a></li> <li><a href="#DESCRIPTION">DESCRIPTION</a></li> <li><a href="#OPTIONS">OPTIONS</a></li> <li><a href="#EXAMPLES">EXAMPLES</a></li> <li><a href="#NOTES">NOTES</a></li> <li><a href="#BUGS">BUGS</a></li> <li><a href="#COPYRIGHT">COPYRIGHT</a></li> </ul> <h1 id="NAME">NAME</h1> <p>openssl-nseq, nseq - create or examine a Netscape certificate sequence</p> <h1 id="SYNOPSIS">SYNOPSIS</h1> <p><b>openssl</b> <b>nseq</b> [<b>-help</b>] [<b>-in filename</b>] [<b>-out filename</b>] [<b>-toseq</b>]</p> <h1 id="DESCRIPTION">DESCRIPTION</h1> <p>The <b>nseq</b> command takes a file containing a Netscape certificate sequence and prints out the certificates contained in it or takes a file of certificates and converts it into a Netscape certificate sequence.</p> <h1 id="OPTIONS">OPTIONS</h1> <dl> <dt id="help"><b>-help</b></dt> <dd> <p>Print out a usage message.</p> </dd> <dt id="in-filename"><b>-in filename</b></dt> <dd> <p>This specifies the input filename to read or standard input if this option is not specified.</p> </dd> <dt id="out-filename"><b>-out filename</b></dt> <dd> <p>Specifies the output filename or standard output by default.</p> </dd> <dt id="toseq"><b>-toseq</b></dt> <dd> <p>Normally a Netscape certificate sequence will be input and the output is the certificates contained in it. With the <b>-toseq</b> option the situation is reversed: a Netscape certificate sequence is created from a file of certificates.</p> </dd> </dl> <h1 id="EXAMPLES">EXAMPLES</h1> <p>Output the certificates in a Netscape certificate sequence</p> <pre><code> openssl nseq -in nseq.pem -out certs.pem</code></pre> <p>Create a Netscape certificate sequence</p> <pre><code> openssl nseq -in certs.pem -toseq -out nseq.pem</code></pre> <h1 id="NOTES">NOTES</h1> <p>The <b>PEM</b> encoded form uses the same headers and footers as a certificate:</p> <pre><code> -----BEGIN CERTIFICATE----- -----END CERTIFICATE-----</code></pre> <p>A Netscape certificate sequence is a Netscape specific format that can be sent to browsers as an alternative to the standard PKCS#7 format when several certificates are sent to the browser: for example during certificate enrollment. It is used by Netscape certificate server for example.</p> <h1 id="BUGS">BUGS</h1> <p>This program needs a few more options: like allowing DER or PEM input and output files and allowing multiple certificate files to be used.</p> <h1 id="COPYRIGHT">COPYRIGHT</h1> <p>Copyright 2000-2017 The OpenSSL Project Authors. All Rights Reserved.</p> <p>Licensed under the OpenSSL license (the "License"). You may not use this file except in compliance with the License. You can obtain a copy in the file LICENSE in the source distribution or at <a href="https://www.openssl.org/source/license.html">https://www.openssl.org/source/license.html</a>.</p> </body> </html>
[-] CA.pl.html
[edit]
[-] openssl-srp.html
[edit]
[-] openssl-asn1parse.html
[edit]
[-] openssl-version.html
[edit]
[-] ecparam.html
[edit]
[-] dhparam.html
[edit]
[-] openssl-ocsp.html
[edit]
[-] storeutl.html
[edit]
[-] crl2pkcs7.html
[edit]
[-] list.html
[edit]
[-] openssl-pkcs8.html
[edit]
[-] engine.html
[edit]
[-] openssl-ts.html
[edit]
[-] sess_id.html
[edit]
[-] rand.html
[edit]
[-] openssl-rsa.html
[edit]
[-] openssl-x509.html
[edit]
[+]
..
[-] openssl-dsa.html
[edit]
[-] rehash.html
[edit]
[-] openssl-prime.html
[edit]
[-] openssl-list.html
[edit]
[-] genrsa.html
[edit]
[-] openssl-ec.html
[edit]
[-] openssl-pkeyutl.html
[edit]
[-] openssl-nseq.html
[edit]
[-] s_time.html
[edit]
[-] ts.html
[edit]
[-] openssl-cms.html
[edit]
[-] s_client.html
[edit]
[-] version.html
[edit]
[-] openssl-enc.html
[edit]
[-] ciphers.html
[edit]
[-] openssl-c_rehash.html
[edit]
[-] pkey.html
[edit]
[-] x509.html
[edit]
[-] openssl-s_server.html
[edit]
[-] openssl-smime.html
[edit]
[-] dgst.html
[edit]
[-] openssl-tsget.html
[edit]
[-] passwd.html
[edit]
[-] openssl-dhparam.html
[edit]
[-] s_server.html
[edit]
[-] ca.html
[edit]
[-] openssl-errstr.html
[edit]
[-] speed.html
[edit]
[-] enc.html
[edit]
[-] openssl-rehash.html
[edit]
[-] pkeyutl.html
[edit]
[-] genpkey.html
[edit]
[-] openssl-genrsa.html
[edit]
[-] openssl-spkac.html
[edit]
[-] openssl-storeutl.html
[edit]
[-] tsget.html
[edit]
[-] openssl-crl.html
[edit]
[-] crl.html
[edit]
[-] smime.html
[edit]
[-] openssl-s_client.html
[edit]
[-] dsa.html
[edit]
[-] c_rehash.html
[edit]
[-] rsa.html
[edit]
[-] asn1parse.html
[edit]
[-] verify.html
[edit]
[-] openssl-sess_id.html
[edit]
[-] req.html
[edit]
[-] openssl-ciphers.html
[edit]
[-] openssl-engine.html
[edit]
[-] dsaparam.html
[edit]
[-] openssl-s_time.html
[edit]
[-] openssl-crl2pkcs7.html
[edit]
[-] openssl-ecparam.html
[edit]
[-] gendsa.html
[edit]
[-] pkcs12.html
[edit]
[-] openssl-verify.html
[edit]
[-] openssl-pkeyparam.html
[edit]
[-] openssl-passwd.html
[edit]
[-] pkcs8.html
[edit]
[-] openssl-rsautl.html
[edit]
[-] openssl-ca.html
[edit]
[-] openssl-dsaparam.html
[edit]
[-] openssl-gendsa.html
[edit]
[-] openssl-pkcs12.html
[edit]
[-] srp.html
[edit]
[-] prime.html
[edit]
[-] openssl-req.html
[edit]
[-] pkeyparam.html
[edit]
[-] rsautl.html
[edit]
[-] openssl.html
[edit]
[-] spkac.html
[edit]
[-] openssl-rand.html
[edit]
[-] openssl-pkey.html
[edit]
[-] openssl-genpkey.html
[edit]
[-] ocsp.html
[edit]
[-] openssl-speed.html
[edit]
[-] pkcs7.html
[edit]
[-] errstr.html
[edit]
[-] openssl-dgst.html
[edit]
[-] ec.html
[edit]
[-] nseq.html
[edit]
[-] openssl-pkcs7.html
[edit]
[-] cms.html
[edit]