SMIME TOOL VERSION 0.7
======================
17.11.1999, Sampo Kellomaki <[EMAIL PROTECTED]>

Available from

        http://www.bacus.pt/Net_SSLeay/smime.html

or as part of (future) OpenSSL-0.9.5 (see www.openssl.org)

Smime tool is a set of utilities for doing smime signatures as well as
basic key generation and certificate authority functions. It does

        - sign and encrypt email and other S/MIME messages
        - verify signatures and decrypt messages
        - generate keys, certification requests, and self signed certificates
        - certificate authority: sign certificate requests into certificates
        - convert pem format to and from PKCS12 (allows importing and
          exporting keys to and from Netscape (and probably Outlook Express))
        - interoperates with Netscape mail reader, will probably interoperate
          with Outlook Express
        - standards compliant uses S/MIME, PKCS12, and pem

Included in the package

        - smime command line tool
        - smimeutil library (written in C)
        - perl module to access all of the above functionality (SMIMEUtil::)
        - tutorial (the README file)
        - documentation (the simeutil.h file ;-)

Applications

        - Provide smime capability for popular mail readers, such as elm,
          pine, or mh
        - CGI scripts that send S/MIME mail using perl or command line
        - Mail processing robots that read S/MIME mail using perl or cmd line
        - S/MIME over http, smime over anything
        - Archieve signed documents in S/MIME format
        - Sign software distributions (tarballs)
        - Be your own certification authority

Usage
        ./smime -cs private password <mime-entity >smime  # clear sign
        ./smime -cv cert <smime-entity >data              # verify clear sig
        ./smime -ds private passwd <file >smime-sig       # make detached sig
        ./smime -dv file <smime-sig-entity                # verify detached
        ./smime -s  private password <mime-entity >smime  # sign
        ./smime -qs <smime-entity >signing-cert-info      # find out who signed
        ./smime -v cert <smime-entity >signer-dn          # verify signature

        ./smime -vc cacert <cert                          # verify certificate

        ./smime -e public <mime-entity >smime-ent         # encrypt
        ./smime -d private password <smime-entity >mime   # decrypt

        ./smime -qr <req.pem    # Query all you can about request
        ./smime -qc <cert.pem   # Query all you can about certificate
        ./smime -ca ca_cert passwd serial <req.pem >cert.pem     # sign a req

        ./smime -p12-pem p12pw pempw <x.p12 >x.pem  # convert PKCS12 to pem
        ./smime -pem-p12 [EMAIL PROTECTED] pempw p12pw <x.pem >x.p12

        ./smime -m type1 file1 type2 file2 type3 file3 <text  # make multipart
        ./smime -m image/gif foo.gif <message | ./smime -s private pass >smime

        ./smime -kg attr passwd req.pem <dn >priv_ss.pem  # keygen

        ./smime -base64 <file >file.base64
        ./smime -unbase64 <file.base64 >file
        ./smime -mime text/plain <file >mime-entity
        ./smime -mime_base64 image/gif <file.gif >mime-entity
        ./smime -split dirprefix <multipart         # splits multipart
        ./smime -base64 <in | ./smime -unbase64 >out
        ./smime -cat <in >out   # copy input to output using slurp and barf

        ./smime -kg 'description=Test' secret req.pem <me.dn >ss.pem

--Sampo
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to