Package: libnss3-tools
Version: 2:3.106-1
Severity: minor
Tags: patch

   * What led up to the situation?

     Checking for defects with

test-[g|n]roff -mandoc -t -K utf8 -rF0 -rHY=0 -ww -b -z < "man page"

  [Use "groff -e ' $' <file>" to find trailing spaces.]

  ["test-groff" is a script in the repository for "groff"; is not shipped]
(local copy and "troff" slightly changed by me).

  [The fate of "test-nroff" was decided in groff bug #55941.]

   * What was the outcome of this action?

troff:<stdin>:1480: warning: trailing space in the line
troff:<stdin>:1674: warning: trailing space in the line
troff:<stdin>:1678: warning: trailing space in the line

   * What outcome did you expect instead?

     No output (no warnings).

-.-

  General remarks and further material, if a diff-file exist, are in the
attachments.


-- System Information:
Debian Release: trixie/sid
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 6.11.10-amd64 (SMP w/2 CPU threads; PREEMPT)
Locale: LANG=is_IS.iso88591, LC_CTYPE=is_IS.iso88591 (charmap=ISO-8859-1), 
LANGUAGE not set
Shell: /bin/sh linked to /usr/bin/dash
Init: sysvinit (via /sbin/init)

Versions of packages libnss3-tools depends on:
ii  libc6     2.40-3
ii  libnspr4  2:4.36-1
ii  libnss3   2:3.106-1
ii  zlib1g    1:1.3.dfsg+really1.3.1-1+b1

libnss3-tools recommends no packages.

libnss3-tools suggests no packages.

-- no debconf information
Input file is certutil.1

  Any program (person), that produces man pages, should check the output
for defects by using (both groff and nroff)

[gn]roff -mandoc -t -ww -b -z -K utf8  <man page>

  The same goes for man pages that are used as an input.

  For a style guide use

  mandoc -T lint

-.-

  So any 'generator' should check its products with the above mentioned
'groff', 'mandoc',  and additionally with 'nroff ...'.

  This is just a simple quality control measure.

  The 'generator' may have to be corrected to get a better man page,
the source file may, and any additional file may.

  Common defects:

  Input text line longer than 80 bytes.

  Not removing trailing spaces (in in- and output).
  The reason for these trailing spaces should be found and eliminated.

  Not beginning each input sentence on a new line.
Lines should thus be shorter.

  See man-pages(7), item 'semantic newline'.

-.-

The difference between the formatted output of the original and patched file
can be seen with:

  nroff -mandoc <file1> > <out1>
  nroff -mandoc <file2> > <out2>
  diff -u <out1> <out2>

and for groff, using

"printf '%s\n%s\n' '.kern 0' '.ss 12 0' | groff -mandoc -Z - "

instead of 'nroff -mandoc'

  Add the option '-t', if the file contains a table.

  Read the output of 'diff -u' with 'less -R' or similar.

-.-.

  If 'man' (man-db) is used to check the manual for warnings,
the following must be set:

  The option "-warnings=w"

  The environmental variable:

export MAN_KEEP_STDERR=yes (or any non-empty value)

  or

  (produce only warnings):

export MANROFFOPT="-ww -b -z"

export MAN_KEEP_STDERR=yes (or any non-empty value)


-.-.

Output from "mandoc -T lint  certutil.1 ": (shortened list)

    115 input text line longer than 80 bytes
      9 skipping paragraph macro

-.-.

Output from "test-groff -mandoc -t -ww -b -z certutil.1 ": (shortened list)

      3 trailing space in the line

-.-.

Output from "mandoc -T lint  certutil.1 ":

mandoc: certutil.1:31:82: STYLE: input text line longer than 80 bytes: certutil 
\- Manage k...
mandoc: certutil.1:36:2: WARNING: skipping paragraph macro: PP after SH
mandoc: certutil.1:37:90: STYLE: input text line longer than 80 bytes: This 
documentation i...
mandoc: certutil.1:40:2: WARNING: skipping paragraph macro: PP after SH
mandoc: certutil.1:44:278: STYLE: input text line longer than 80 bytes: 
Certificate issuance...
mandoc: certutil.1:48:2: WARNING: skipping paragraph macro: PP after SH
mandoc: certutil.1:51:169: STYLE: input text line longer than 80 bytes: always 
requires one ...
mandoc: certutil.1:59:180: STYLE: input text line longer than 80 bytes: Add an 
existing cert...
mandoc: certutil.1:71:86: STYLE: input text line longer than 80 bytes: Create a 
new binary ...
mandoc: certutil.1:73:81: STYLE: input text line longer than 80 bytes: argument 
to specify ...
mandoc: certutil.1:95:200: STYLE: input text line longer than 80 bytes: Delete 
a private key...
mandoc: certutil.1:99:142: STYLE: input text line longer than 80 bytes: Some 
smart cards do ...
mandoc: certutil.1:104:313: STYLE: input text line longer than 80 bytes: 
Generate a new publi...
mandoc: certutil.1:114:178: STYLE: input text line longer than 80 bytes: List 
the key ID of k...
mandoc: certutil.1:119:218: STYLE: input text line longer than 80 bytes: List 
all the certifi...
mandoc: certutil.1:124:83: STYLE: input text line longer than 80 bytes: Modify 
a certificate...
mandoc: certutil.1:139:257: STYLE: input text line longer than 80 bytes: Create 
a certificate...
mandoc: certutil.1:174:116: STYLE: input text line longer than 80 bytes: 
Upgrade an old datab...
mandoc: certutil.1:183:84: STYLE: input text line longer than 80 bytes: 
Arguments modify a c...
mandoc: certutil.1:187:196: STYLE: input text line longer than 80 bytes: Use 
ASCII format or ...
mandoc: certutil.1:192:106: STYLE: input text line longer than 80 bytes: When 
printing the ce...
mandoc: certutil.1:197:112: STYLE: input text line longer than 80 bytes: 
Specify a time at wh...
mandoc: certutil.1:209:85: STYLE: input text line longer than 80 bytes: If this 
option is no...
mandoc: certutil.1:214:259: STYLE: input text line longer than 80 bytes: 
Identify the certifi...
mandoc: certutil.1:219:83: STYLE: input text line longer than 80 bytes: Specify 
the database...
mandoc: certutil.1:254:122: STYLE: input text line longer than 80 bytes: If no 
prefix is spec...
mandoc: certutil.1:266:85: STYLE: input text line longer than 80 bytes: Check a 
certificate\...
mandoc: certutil.1:271:89: STYLE: input text line longer than 80 bytes: Specify 
the email ad...
mandoc: certutil.1:276:113: STYLE: input text line longer than 80 bytes: Add 
one or multiple ...
mandoc: certutil.1:314:234: STYLE: input text line longer than 80 bytes: 
Specify a file that ...
mandoc: certutil.1:319:213: STYLE: input text line longer than 80 bytes: Set a 
key size to us...
mandoc: certutil.1:324:115: STYLE: input text line longer than 80 bytes: 
Specify the name of ...
mandoc: certutil.1:326:207: STYLE: input text line longer than 80 bytes: The 
name can also be...
mandoc: certutil.1:331:173: STYLE: input text line longer than 80 bytes: Pass 
an input file t...
mandoc: certutil.1:338:304: STYLE: input text line longer than 80 bytes: The 
valid key type o...
mandoc: certutil.1:343:81: STYLE: input text line longer than 80 bytes: Display 
detailed inf...
mandoc: certutil.1:348:237: STYLE: input text line longer than 80 bytes: Assign 
a unique seri...
mandoc: certutil.1:353:177: STYLE: input text line longer than 80 bytes: 
Specify the nickname...
mandoc: certutil.1:355:289: STYLE: input text line longer than 80 bytes: The 
nickname can als...
mandoc: certutil.1:360:244: STYLE: input text line longer than 80 bytes: 
Specify the output f...
mandoc: certutil.1:365:172: STYLE: input text line longer than 80 bytes: 
Specify the prefix u...
mandoc: certutil.1:370:158: STYLE: input text line longer than 80 bytes: 
Specify a contact te...
mandoc: certutil.1:375:114: STYLE: input text line longer than 80 bytes: Read 
an alternate PQ...
mandoc: certutil.1:377:83: STYLE: input text line longer than 80 bytes: 
generates its own PQ...
mandoc: certutil.1:379:87: STYLE: input text line longer than 80 bytes: 
Elliptic curve name ...
mandoc: certutil.1:381:840: STYLE: input text line longer than 80 bytes: If a 
token is availa...
mandoc: certutil.1:386:118: STYLE: input text line longer than 80 bytes: 
Display a certificat...
mandoc: certutil.1:391:208: STYLE: input text line longer than 80 bytes: 
Identify a particula...
mandoc: certutil.1:396:229: STYLE: input text line longer than 80 bytes: 
Specify the trust at...
mandoc: certutil.1:398:98: STYLE: input text line longer than 80 bytes: for 
each trust setti...
mandoc: certutil.1:460:140: STYLE: input text line longer than 80 bytes: The 
attribute codes ...
mandoc: certutil.1:464:110: STYLE: input text line longer than 80 bytes: Use 
the \-L option t...
mandoc: certutil.1:466:195: STYLE: input text line longer than 80 bytes: Note 
that the output...
mandoc: certutil.1:471:85: STYLE: input text line longer than 80 bytes: Specify 
a usage cont...
mandoc: certutil.1:598:162: STYLE: input text line longer than 80 bytes: Set 
the number of mo...
mandoc: certutil.1:600:86: STYLE: input text line longer than 80 bytes: 
option\&. If this ar...
mandoc: certutil.1:605:420: STYLE: input text line longer than 80 bytes: Set an 
offset from t...
mandoc: certutil.1:610:91: STYLE: input text line longer than 80 bytes: Force 
the key and ce...
mandoc: certutil.1:621:137: STYLE: input text line longer than 80 bytes: to 
generate the sign...
mandoc: certutil.1:626:179: STYLE: input text line longer than 80 bytes: Set an 
alternate exp...
mandoc: certutil.1:635:145: STYLE: input text line longer than 80 bytes: 
option) to be used w...
mandoc: certutil.1:644:194: STYLE: input text line longer than 80 bytes: 
option)\&. This only...
mandoc: certutil.1:649:246: STYLE: input text line longer than 80 bytes: Read a 
seed value fr...
mandoc: certutil.1:654:96: STYLE: input text line longer than 80 bytes: Specify 
the hash alg...
mandoc: certutil.1:752:104: STYLE: input text line longer than 80 bytes: Set an 
X\&.509 V3 Ce...
mandoc: certutil.1:845:167: STYLE: input text line longer than 80 bytes: Add a 
basic constrai...
mandoc: certutil.1:854:369: STYLE: input text line longer than 80 bytes: Add an 
authority key...
mandoc: certutil.1:861:208: STYLE: input text line longer than 80 bytes: Add a 
CRL distributi...
mandoc: certutil.1:870:149: STYLE: input text line longer than 80 bytes: Add an 
X\&.509 V3 ce...
mandoc: certutil.1:965:134: STYLE: input text line longer than 80 bytes: Add an 
extended key ...
mandoc: certutil.1:1148:268: STYLE: input text line longer than 80 bytes: Add a 
comma\-separat...
mandoc: certutil.1:1153:262: STYLE: input text line longer than 80 bytes: Add a 
comma\-separat...
mandoc: certutil.1:1158:128: STYLE: input text line longer than 80 bytes: Add 
the Authority In...
mandoc: certutil.1:1163:126: STYLE: input text line longer than 80 bytes: Add 
the Subject Info...
mandoc: certutil.1:1168:120: STYLE: input text line longer than 80 bytes: Add 
the Certificate ...
mandoc: certutil.1:1173:115: STYLE: input text line longer than 80 bytes: Add 
the Policy Mappi...
mandoc: certutil.1:1178:118: STYLE: input text line longer than 80 bytes: Add 
the Policy Const...
mandoc: certutil.1:1183:125: STYLE: input text line longer than 80 bytes: Add 
the Inhibit Any ...
mandoc: certutil.1:1188:114: STYLE: input text line longer than 80 bytes: Add 
the Subject Key ...
mandoc: certutil.1:1193:113: STYLE: input text line longer than 80 bytes: Add a 
Name Constrain...
mandoc: certutil.1:1210:237: STYLE: input text line longer than 80 bytes: PKCS 
#11 key Attribu...
mandoc: certutil.1:1215:206: STYLE: input text line longer than 80 bytes: PKCS 
#11 key Operati...
mandoc: certutil.1:1248:2: WARNING: skipping paragraph macro: PP after SH
mandoc: certutil.1:1249:211: STYLE: input text line longer than 80 bytes: Most 
of the command ...
mandoc: certutil.1:1255:112: STYLE: input text line longer than 80 bytes: 
Certificates, keys, ...
mandoc: certutil.1:1304:319: STYLE: input text line longer than 80 bytes: A 
certificate reques...
mandoc: certutil.1:1329:104: STYLE: input text line longer than 80 bytes: to 
specify either th...
mandoc: certutil.1:1368:122: STYLE: input text line longer than 80 bytes: The 
new certificate ...
mandoc: certutil.1:1387:246: STYLE: input text line longer than 80 bytes: A 
valid certificate ...
mandoc: certutil.1:1405:140: STYLE: input text line longer than 80 bytes: 
options set certific...
mandoc: certutil.1:1419:124: STYLE: input text line longer than 80 bytes: The 
interative promp...
mandoc: certutil.1:1435:160: STYLE: input text line longer than 80 bytes: When 
a certificate r...
mandoc: certutil.1:1439:102: STYLE: input text line longer than 80 bytes: 
argument)\&. The iss...
mandoc: certutil.1:1467:135: STYLE: input text line longer than 80 bytes: 
command option lists...
mandoc: certutil.1:1489:91: STYLE: input text line longer than 80 bytes: can 
return and print...
mandoc: certutil.1:1594:148: STYLE: input text line longer than 80 bytes: Keys 
are the origina...
mandoc: certutil.1:1662:181: STYLE: input text line longer than 80 bytes: The 
devices that can...
mandoc: certutil.1:1688:151: STYLE: input text line longer than 80 bytes: 
Existing certificate...
mandoc: certutil.1:1736:123: STYLE: input text line longer than 80 bytes: 
option\&. The only r...
mandoc: certutil.1:1762:423: STYLE: input text line longer than 80 bytes: A 
certificate contai...
mandoc: certutil.1:1790:272: STYLE: input text line longer than 80 bytes: The 
trust settings (...
mandoc: certutil.1:1818:164: STYLE: input text line longer than 80 bytes: 
because every certif...
mandoc: certutil.1:1820:202: STYLE: input text line longer than 80 bytes: 
prints the full chai...
mandoc: certutil.1:1839:415: STYLE: input text line longer than 80 bytes: The 
device which sto...
mandoc: certutil.1:1851:185: STYLE: input text line longer than 80 bytes: Many 
networks have d...
mandoc: certutil.1:1865:203: STYLE: input text line longer than 80 bytes: Many 
networks or app...
mandoc: certutil.1:1875:99: STYLE: input text line longer than 80 bytes: 
command must give in...
mandoc: certutil.1:1902:199: STYLE: input text line longer than 80 bytes: 
command only require...
mandoc: certutil.1:1942:2: WARNING: skipping paragraph macro: PP after SH
mandoc: certutil.1:1943:100: STYLE: input text line longer than 80 bytes: NSS 
originally used ...
mandoc: certutil.1:1980:382: STYLE: input text line longer than 80 bytes: 
BerkeleyDB has perfo...
mandoc: certutil.1:1982:162: STYLE: input text line longer than 80 bytes: In 
2009, NSS introdu...
mandoc: certutil.1:2014:123: STYLE: input text line longer than 80 bytes: 
pkcs11\&.txt, a list...
mandoc: certutil.1:2019:115: STYLE: input text line longer than 80 bytes: 
database type\&. The...
mandoc: certutil.1:2067:94: STYLE: input text line longer than 80 bytes: For an 
engineering d...
mandoc: certutil.1:2080:2: WARNING: skipping paragraph macro: PP after SH
mandoc: certutil.1:2121:102: STYLE: input text line longer than 80 bytes: The 
NSS wiki has inf...
mandoc: certutil.1:2145:2: WARNING: skipping paragraph macro: PP after SH
mandoc: certutil.1:2146:102: STYLE: input text line longer than 80 bytes: For 
information abou...
mandoc: certutil.1:2153:2: WARNING: skipping paragraph macro: PP after SH
mandoc: certutil.1:2154:115: STYLE: input text line longer than 80 bytes: The 
NSS tools were w...
mandoc: certutil.1:2156:86: STYLE: input text line longer than 80 bytes: 
Authors: Elio Maldon...
mandoc: certutil.1:2158:2: WARNING: skipping paragraph macro: PP after SH
mandoc: certutil.1:2159:170: STYLE: input text line longer than 80 bytes: 
Licensed under the M...

-.-.

Remove space characters at the end of lines.

Use "git apply ... --whitespace=fix" to fix extra space issues, or use
global configuration "core.whitespace".

1480:Google Internet Authority                                    ,,   
1674:    slot: NSS User Private Key and Certificate Services                  
1678:    slot: NSS Internal Cryptographic Services                            

-.-.

Strings longer than 3/4 of a standard line length (80)
Use "\:" to split the string at the end of an output line, for example a
long URLs (web address)

274 \-\-extGeneric 
OID:critical\-flag:filename[,OID:critical\-flag:filename]\&.\&.\&.
355 The nickname can also be a PKCS #11 URI\&. For example, if you have a 
certificate named "my\-server\-cert" on the internal certificate store, it can 
be unambiguously specified as 
"pkcs11:token=NSS%20Certificate%20DB;object=my\-server\-cert"\&. For details 
about the format, see RFC 7512\&.
1501 MIIB1DCCAT2gAwIBAgICDkIwDQYJKoZIhvcNAQEFBQAwFTETMBEGA1UEAxMKRXhh
1502 bXBsZSBDQTAeFw0xMzAzMTMxOTEwMjlaFw0xMzA2MTMxOTEwMjlaMBUxEzARBgNV
1503 BAMTCkV4YW1wbGUgQ0EwgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAJ4Kzqvz
1504 JyBVgFqDXRYSyTBNw1DrxUU/3GvWA/ngjAwHEv0Cul/6sO/gsCvnABHiH6unns6x
1505 XRzPORlC2WY3gkk7vmlsLvYpyecNazAi/NAwVnU/66HOsaoVFWE+gBQo99UrN2yk
1506 0BiK/GMFlLm5dXQROgA9ZKKyFdI0LIXtf6SbAgMBAAGjMzAxMBEGCWCGSAGG+EIB
1507 AQQEAwIHADAMBgNVHRMEBTADAQH/MA4GA1UdDwEB/wQEAwICBDANBgkqhkiG9w0B
1508 AQUFAAOBgQA6chkzkACN281d1jKMrc+RHG2UMaQyxiteaLVZO+Ro1nnRUvseDf09
1509 XKYFwPMJjWCihVku6bw/ihZfuMHhxK22Nue6inNQ6eDu7WmrqL8z3iUrQwxs+WiF
1676      uri: 
pkcs11:token=NSS%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203
1680      uri: 
pkcs11:token=NSS%20Generic%20Crypto%20Services;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203
2147 \m[blue]\fBhttp://www\&.mozilla\&.org/projects/security/pki/nss/\fR\m[]\&;. 
The NSS site relates directly to NSS code changes and releases\&.

-.-.

Wrong distance between sentences in the input file.

  Separate the sentences and subordinate clauses; each begins on a new
line.  See man-pages(7) ("Conventions for source file layout") and
"info groff" ("Input Conventions").

  The best procedure is to always start a new sentence on a new line,
at least, if you are typing on a computer.

Remember coding: Only one command ("sentence") on each (logical) line.

E-mail: Easier to quote exactly the relevant lines.

Generally: Easier to edit the sentence.

Patches: Less unaffected text.

Search for two adjacent words is easier, when they belong to the same line,
and the same phrase.

  The amount of space between sentences in the output can then be
controlled with the ".ss" request.

N.B.

  The number of lines affected can be too large to be in a patch.

37:This documentation is still work in progress\&. Please contribute to the 
initial review in
42:\fBcertutil\fR, is a command\-line utility that can create and modify 
certificate and key databases\&. It can specifically list, generate, modify, or 
delete certificates, create or change the password, generate new public and 
private key pairs, display the contents of the key database, or delete key 
pairs within the key database\&.
44:Certificate issuance, part of the key and certificate management process, 
requires that keys and certificates be created in the key database\&. This 
document discusses certificate and key database management\&. For information 
on the security module database management, see the
51:always requires one and only one command option to specify the type of 
certificate operation\&. Each command option may take zero or more arguments\&. 
The command option
59:Add an existing certificate to a certificate database\&. The certificate 
database should already exist; if one is not present, this command option will 
initialize one by default\&.
64:Run a series of commands from the specified batch file\&. This requires the
71:Create a new binary certificate file from a binary certificate request 
file\&. Use the
73:argument to specify the certificate request file\&. If this argument is not 
used,
95:Delete a private key and the associated certificate from a database\&. 
Specify the key to delete with the \-n argument or the \-k argument\&. Specify 
the database from which to delete the key with the
99:Some smart cards do not let you remove a public key you have generated\&. In 
such a case, only the private key is deleted from the key pair\&.
104:Generate a new public and private key pair within a key database\&. The key 
database should already exist; if one is not present, this command option will 
initialize one by default\&. Some smart cards can store only one key pair\&. If 
you create a new key pair for such a card, the previous pair is overwritten\&.
114:List the key ID of keys in the key database\&. A key ID is the modulus of 
the RSA key or the publicValue of the DSA key\&. IDs are displayed in 
hexadecimal ("0x" is not shown)\&.
119:List all the certificates, or display information about a named 
certificate, in a certificate database\&. Use the \-h tokenname argument to 
specify the certificate database on a particular hardware or software token\&.
139:Create a certificate request file that can be submitted to a Certificate 
Authority (CA) for processing into a finished certificate\&. Output defaults to 
standard out unless you use \-o output\-file argument\&. Use the \-a argument 
to specify ASCII output\&.
174:Upgrade an old database and merge it into a new database\&. This is used to 
migrate legacy NSS databases (cert8\&.db
187:Use ASCII format or allow the use of ASCII format for input or output\&. 
This formatting follows RFC 1113\&. For certificate requests, ASCII output 
defaults to standard output unless redirected\&.
197:Specify a time at which a certificate is required to be valid\&. Use when 
checking certificate validity with the
199:option\&. The format of the
202:\fIYYMMDDHHMMSS[+HHMM|\-HHMM|Z]\fR, which allows offsets to be set relative 
to the validity end time\&. Specifying seconds (\fISS\fR) is optional\&. When 
specifying an explicit time, use a Z at the end of the term,
203:\fIYYMMDDHHMMSSZ\fR, to close it\&. When specifying an offset time, use
214:Identify the certificate of the CA from which a new certificate will derive 
its authenticity\&. Use the exact nickname or alias of the CA certificate, or 
use the CA\*(Aqs email address\&. Bracket the issuer string with quotation 
marks if it contains spaces\&.
254:If no prefix is specified the default type is retrieved from 
NSS_DEFAULT_DB_TYPE\&. If NSS_DEFAULT_DB_TYPE is not set then
271:Specify the email address of a certificate to list\&. Used with the \-L 
command option\&.
314:Specify a file that will automatically supply the password to include in a 
certificate or to access a certificate database\&. This is a plain\-text file 
containing one password\&. Be sure to prevent unauthorized access to this 
file\&.
319:Set a key size to use when generating new public and private key pairs\&. 
The minimum is 512 bits and the maximum is 16384 bits\&. The default is 2048 
bits\&. Any size between the minimum and maximum is allowed\&.
324:Specify the name of a token to use or act on\&. If not specified the 
default token is the internal database slot\&.
326:The name can also be a PKCS #11 URI\&. For example, the NSS internal 
certificate store can be unambiguously specified as 
"pkcs11:token=NSS%20Certificate%20DB"\&. For details about the format, see RFC 
7512\&.
331:Pass an input file to the command\&. Depending on the command option, an 
input file can be a specific certificate, a certificate request file, or a 
batch file of commands\&.
338:The valid key type options are rsa, dsa, ec, or all\&. The default value is 
rsa\&. Specifying the type of key can avoid mistakes caused by duplicate 
nicknames\&. Giving a key type generates a new key pair; giving the ID of an 
existing key reuses that key pair (which is required to renew certificates)\&.
348:Assign a unique serial number to a certificate being created\&. This 
operation should be performed by a CA\&. If no serial number is provided a 
default serial number is made from the current time\&. Serial numbers are 
limited to integers
353:Specify the nickname of a certificate or key to list, create, add to a 
database, modify, or validate\&. Bracket the nickname string with quotation 
marks if it contains spaces\&.
355:The nickname can also be a PKCS #11 URI\&. For example, if you have a 
certificate named "my\-server\-cert" on the internal certificate store, it can 
be unambiguously specified as 
"pkcs11:token=NSS%20Certificate%20DB;object=my\-server\-cert"\&. For details 
about the format, see RFC 7512\&.
360:Specify the output file name for new certificates or binary certificate 
requests\&. Bracket the output\-file string with quotation marks if it contains 
spaces\&. If this argument is not used the output destination defaults to 
standard output\&.
365:Specify the prefix used on the certificate and key database file\&. This 
argument is provided to support legacy servers\&. Most applications do not use 
a database prefix\&.
370:Specify a contact telephone number to include in new certificates or 
certificate requests\&. Bracket this string with quotation marks if it contains 
spaces\&.
375:Read an alternate PQG value from the specified file when generating DSA key 
pairs\&. If this argument is not used,
377:generates its own PQG value\&. PQG files are created with a separate DSA 
utility\&.
391:Identify a particular certificate owner for new certificates or certificate 
requests\&. Bracket this string with quotation marks if it contains spaces\&. 
The subject identification format follows RFC #1485\&.
396:Specify the trust attributes to modify in an existing certificate or to 
apply to a certificate when creating it or adding it to a database\&. There are 
three available trust categories for each certificate, expressed in the order
398:for each trust setting\&. In each category position, use none, any, or all 
of the attribute codes:
460:The attribute codes for the categories are separated by commas, and the 
entire set of attributes enclosed by quotation marks\&. For example:
466:Note that the output of the \-L option may include "u" flag, which means 
that there is a private key associated with the certificate\&. It is a dynamic 
flag and you cannot set it with certutil\&.
598:Set the number of months a new certificate will be valid\&. The validity 
period begins at the current system time unless an offset is added or 
subtracted with the
600:option\&. If this argument is not used, the default validity period is 
three months\&.
605:Set an offset from the current system time, in months, for the beginning of 
a certificate\*(Aqs validity period\&. Use when creating the certificate or 
adding it to a database\&. Express the offset in integers, using a minus sign 
(\-) to indicate a negative offset\&. If this argument is not used, the 
validity period begins at the current system time\&. The length of the validity 
period is set with the \-v argument\&.
610:Force the key and certificate database to open in read\-write mode\&. This 
is used with the
626:Set an alternate exponent value to use in generating a new RSA public key 
for the database, instead of the default value of 65537\&. The available 
alternate values are 3 and 17\&.
635:option) to be used with the RSA\-PSS signature scheme\&. This only works 
when the private key of the certificate or certificate request is RSA\&.
644:option)\&. This only works when the private key of the signer\*(Aqs 
certificate is RSA\&. If the signer\*(Aqs certificate is restricted to 
RSA\-PSS, it is not necessary to specify this option\&.
649:Read a seed value from the specified file to generate a new private and 
public key pair\&. This argument makes it possible to use hardware\-generated 
seed values or manually create a value from the keyboard\&. The minimum file 
size is 20 bytes\&.
654:Specify the hash algorithm to use with the \-C, \-S or \-R command 
options\&. Possible keywords:
752:Set an X\&.509 V3 Certificate Type Extension in the certificate\&. There 
are several available keywords:
845:Add a basic constraint extension to a certificate that is being created or 
added to a database\&. This extension supports the certificate chain 
verification process\&.
854:Add an authority key ID extension to a certificate that is being created or 
added to a database\&. This extension supports the identification of a 
particular certificate, from among multiple certificates associated with one 
subject name, as the correct issuer of a certificate\&. The Certificate 
Database Tool will prompt you to select the authority key ID extension\&.
861:Add a CRL distribution point extension to a certificate that is being 
created or added to a database\&. This extension identifies the URL of a 
certificate\*(Aqs associated certificate revocation list (CRL)\&.
870:Add an X\&.509 V3 certificate type extension to a certificate that is being 
created or added to the database\&. There are several available keywords:
965:Add an extended key usage extension to a certificate that is being created 
or added to the database\&. Several keywords are available:
1148:Add a comma\-separated list of email addresses to the subject alternative 
name extension of a certificate or certificate request that is being created or 
added to the database\&. Subject alternative name extensions are described in 
Section 4\&.2\&.1\&.7 of RFC 3280\&.
1153:Add a comma\-separated list of DNS names to the subject alternative name 
extension of a certificate or certificate request that is being created or 
added to the database\&. Subject alternative name extensions are described in 
Section 4\&.2\&.1\&.7 of RFC 3280\&.
1158:Add the Authority Information Access extension to the certificate\&. 
X\&.509 certificate extensions are described in RFC 5280\&.
1163:Add the Subject Information Access extension to the certificate\&. X\&.509 
certificate extensions are described in RFC 5280\&.
1168:Add the Certificate Policies extension to the certificate\&. X\&.509 
certificate extensions are described in RFC 5280\&.
1173:Add the Policy Mappings extension to the certificate\&. X\&.509 
certificate extensions are described in RFC 5280\&.
1178:Add the Policy Constraints extension to the certificate\&. X\&.509 
certificate extensions are described in RFC 5280\&.
1183:Add the Inhibit Any Policy Access extension to the certificate\&. X\&.509 
certificate extensions are described in RFC 5280\&.
1188:Add the Subject Key ID extension to the certificate\&. X\&.509 certificate 
extensions are described in RFC 5280\&.
1193:Add a Name Constraint extension to the certificate\&. X\&.509 certificate 
extensions are described in RFC 5280\&.
1210:PKCS #11 key Attributes\&. Comma separated list of key attribute flags, 
selected from the following list of choices: {token | session} {public | 
private} {sensitive | insensitive} {modifiable | unmodifiable} {extractable | 
unextractable}
1215:PKCS #11 key Operation Flags\&. Comma separated list of one or more of the 
following: {token | session} {public | private} {sensitive | insensitive} 
{modifiable | unmodifiable} {extractable | unextractable}
1249:Most of the command options in the examples listed here have more 
arguments available\&. The arguments included in these examples are the most 
common ones or are used to illustrate a specific scenario\&. Use the
1304:A certificate request contains most or all of the information that is used 
to generate the final certificate\&. This request is submitted separately to a 
certificate authority and is then approved by some mechanism (automatically or 
by human review)\&. Once the request is approved, then the certificate is 
generated\&.
1387:A valid certificate must be issued by a trusted CA\&. This can be done by 
specifying a CA certificate (\fB\-c\fR) that is stored in the certificate 
database\&. If a CA key pair is not available, you can create a self\-signed 
certificate using the
1405:options set certificate extensions that can be added to the certificate 
when it is generated by the CA\&. Interactive prompts will result\&.
1439:argument)\&. The issuing certificate must be in the certificate database 
in the specified directory\&.
1467:command option lists all of the certificates listed in the certificate 
database\&. The path to the directory (\fB\-d\fR) is required\&.
1489:can return and print the information for a single, specific certificate\&. 
For example, the
1594:Keys are the original material used to encrypt certificate data\&. The 
keys generated for certificates are stored separately, in the key database\&.
1608:< 0> rsa      455a6673bde9375c2887ec8bf8016b3f9f35861d   Thawte Freemail 
Member\*(Aqs Thawte Consulting (Pty) Ltd\&. ID
1662:The devices that can be used to store certificates \-\- both internal 
databases and external devices like smart cards \-\- are recognized and used by 
loading security modules\&. The
1666:database\&. The path to the directory (\fB\-d\fR) is required\&.
1688:Existing certificates or certificate requests can be added manually to the 
certificate database, even if they were generated elsewhere\&. This uses the
1715:\fB\-E\fR, is used specifically to add email certificates to the 
certificate database\&. The
1719:command\&. The trust arguments for certificates have the format
1720:\fISSL,S/MIME,Code\-signing\fR, so the middle trust settings relate most 
to email certificates (though the others can be set)\&. For example:
1736:option\&. The only required options are to give the security database 
directory and to identify the certificate nickname\&.
1762:A certificate contains an expiration date in itself, and expired 
certificates are easily rejected\&. However, certificates can also be revoked 
before they hit their expiration date\&. Checking whether a certificate has 
been revoked requires validating the certificate\&. Validation can also be used 
to ensure that the certificate is only used for the purposes it was initially 
issued for\&. Validation is carried out by the
1790:The trust settings (which relate to the operations that a certificate is 
allowed to be used for) can be changed after a certificate is created or added 
to the database\&. This is especially useful for CA certificates, but it can be 
performed for any type of certificate\&.
1818:because every certificate authority itself has a certificate; when a CA 
issues a certificate, it essentially stamps that certificate with its own 
fingerprint\&. The
1820:prints the full chain of a certificate, going from the initial CA (the 
root CA) through ever intermediary CA to the actual certificate\&. For example, 
for an email certificate with two CAs in the chain:
1839:The device which stores certificates \-\- both external hardware devices 
and internal software databases \-\- can be blanked and reused\&. This 
operation is performed on the device which stores the data, not directly on the 
security databases, so the location must be referenced through the token name 
(\fB\-h\fR) as well as any directory path\&. If there is no external token 
used, the default value is internal\&.
1851:Many networks have dedicated personnel who handle changes to security 
tokens (the security officer)\&. This person must supply the password to access 
the specified token\&. For example:
1865:Many networks or applications may be using older BerkeleyDB versions of 
the certificate database (cert8\&.db)\&. Databases can be upgraded to the new 
SQLite version of the database (cert9\&.db) using the
1876:\fB\-d\fR) to give the information about the new databases\&. The command 
also requires information that the tool uses for the process to upgrade and 
write over the original database\&.
1930:command option\&. The only argument for this specifies the input file\&.
1943:NSS originally used BerkeleyDB databases to store security information\&. 
The last versions of these
1980:BerkeleyDB has performance limitations, though, which prevent it from 
being easily used by multiple applications simultaneously\&. NSS has some 
flexibility that allows applications to use their own, independent database 
engine while keeping a shared database and working around the access issues\&. 
Still, NSS requires more flexibility to provide a truly shared security 
database\&.
1982:In 2009, NSS introduced a new set of databases that are SQLite databases 
rather than BerkeleyDB\&. These new databases provide more accessibility and 
performance:
2019:database type\&. The shared database type is preferred; the legacy format 
is included for backward compatibility\&.
2023:\fBmodutil\fR) assume that the given security databases use the SQLite 
type\&. Using the legacy databases must be manually specified by using the
2025:prefix with the given security directory\&. For example:
2147:\m[blue]\fBhttp://www\&.mozilla\&.org/projects/security/pki/nss/\fR\m[]\&;. 
The NSS site relates directly to NSS code changes and releases\&.
2159:Licensed under the Mozilla Public License, v\&. 2\&.0\&. If a copy of the 
MPL was not distributed with this file, You can obtain one at 
http://mozilla\&.org/MPL/2\&.0/\&;.

-.-.

Split lines longer than 80 characters into two or more lines.
Appropriate break points are the end of a sentence and a subordinate
clause; after punctuation marks.

N.B.

  The number of lines affected can be too large to be in a patch.


Line 31, length 82

certutil \- Manage keys and certificate in both NSS databases and other NSS 
tokens

Line 37, length 90

This documentation is still work in progress\&. Please contribute to the 
initial review in

Line 42, length 333

\fBcertutil\fR, is a command\-line utility that can create and modify 
certificate and key databases\&. It can specifically list, generate, modify, or 
delete certificates, create or change the password, generate new public and 
private key pairs, display the contents of the key database, or delete key 
pairs within the key database\&.

Line 44, length 278

Certificate issuance, part of the key and certificate management process, 
requires that keys and certificates be created in the key database\&. This 
document discusses certificate and key database management\&. For information 
on the security module database management, see the

Line 51, length 169

always requires one and only one command option to specify the type of 
certificate operation\&. Each command option may take zero or more arguments\&. 
The command option

Line 59, length 180

Add an existing certificate to a certificate database\&. The certificate 
database should already exist; if one is not present, this command option will 
initialize one by default\&.

Line 71, length 86

Create a new binary certificate file from a binary certificate request file\&. 
Use the

Line 73, length 81

argument to specify the certificate request file\&. If this argument is not 
used,

Line 95, length 200

Delete a private key and the associated certificate from a database\&. Specify 
the key to delete with the \-n argument or the \-k argument\&. Specify the 
database from which to delete the key with the

Line 99, length 142

Some smart cards do not let you remove a public key you have generated\&. In 
such a case, only the private key is deleted from the key pair\&.

Line 104, length 313

Generate a new public and private key pair within a key database\&. The key 
database should already exist; if one is not present, this command option will 
initialize one by default\&. Some smart cards can store only one key pair\&. If 
you create a new key pair for such a card, the previous pair is overwritten\&.

Line 114, length 178

List the key ID of keys in the key database\&. A key ID is the modulus of the 
RSA key or the publicValue of the DSA key\&. IDs are displayed in hexadecimal 
("0x" is not shown)\&.

Line 119, length 218

List all the certificates, or display information about a named certificate, in 
a certificate database\&. Use the \-h tokenname argument to specify the 
certificate database on a particular hardware or software token\&.

Line 124, length 83

Modify a certificate\*(Aqs trust attributes using the values of the \-t 
argument\&.

Line 139, length 257

Create a certificate request file that can be submitted to a Certificate 
Authority (CA) for processing into a finished certificate\&. Output defaults to 
standard out unless you use \-o output\-file argument\&. Use the \-a argument 
to specify ASCII output\&.

Line 174, length 116

Upgrade an old database and merge it into a new database\&. This is used to 
migrate legacy NSS databases (cert8\&.db

Line 183, length 84

Arguments modify a command option and are usually lower case, numbers, or 
symbols\&.

Line 187, length 196

Use ASCII format or allow the use of ASCII format for input or output\&. This 
formatting follows RFC 1113\&. For certificate requests, ASCII output defaults 
to standard output unless redirected\&.

Line 192, length 106

When printing the certificate chain, don\*(Aqt search for a chain if issuer 
name equals to subject name\&.

Line 197, length 112

Specify a time at which a certificate is required to be valid\&. Use when 
checking certificate validity with the

Line 202, length 214

\fIYYMMDDHHMMSS[+HHMM|\-HHMM|Z]\fR, which allows offsets to be set relative to 
the validity end time\&. Specifying seconds (\fISS\fR) is optional\&. When 
specifying an explicit time, use a Z at the end of the term,

Line 209, length 85

If this option is not used, the validity check defaults to the current system 
time\&.

Line 214, length 259

Identify the certificate of the CA from which a new certificate will derive its 
authenticity\&. Use the exact nickname or alias of the CA certificate, or use 
the CA\*(Aqs email address\&. Bracket the issuer string with quotation marks if 
it contains spaces\&.

Line 219, length 83

Specify the database directory containing the certificate and key database 
files\&.

Line 254, length 122

If no prefix is specified the default type is retrieved from 
NSS_DEFAULT_DB_TYPE\&. If NSS_DEFAULT_DB_TYPE is not set then

Line 266, length 85

Check a certificate\*(Aqs signature during the process of validating a 
certificate\&.

Line 271, length 89

Specify the email address of a certificate to list\&. Used with the \-L command 
option\&.

Line 274, length 81

\-\-extGeneric 
OID:critical\-flag:filename[,OID:critical\-flag:filename]\&.\&.\&.

Line 276, length 113

Add one or multiple extensions that certutil cannot encode yet, by loading 
their encodings from external files\&.

Line 314, length 234

Specify a file that will automatically supply the password to include in a 
certificate or to access a certificate database\&. This is a plain\-text file 
containing one password\&. Be sure to prevent unauthorized access to this 
file\&.

Line 319, length 213

Set a key size to use when generating new public and private key pairs\&. The 
minimum is 512 bits and the maximum is 16384 bits\&. The default is 2048 
bits\&. Any size between the minimum and maximum is allowed\&.

Line 324, length 115

Specify the name of a token to use or act on\&. If not specified the default 
token is the internal database slot\&.

Line 326, length 207

The name can also be a PKCS #11 URI\&. For example, the NSS internal 
certificate store can be unambiguously specified as 
"pkcs11:token=NSS%20Certificate%20DB"\&. For details about the format, see RFC 
7512\&.

Line 331, length 173

Pass an input file to the command\&. Depending on the command option, an input 
file can be a specific certificate, a certificate request file, or a batch file 
of commands\&.

Line 338, length 304

The valid key type options are rsa, dsa, ec, or all\&. The default value is 
rsa\&. Specifying the type of key can avoid mistakes caused by duplicate 
nicknames\&. Giving a key type generates a new key pair; giving the ID of an 
existing key reuses that key pair (which is required to renew certificates)\&.

Line 343, length 81

Display detailed information when validating a certificate with the \-V 
option\&.

Line 348, length 237

Assign a unique serial number to a certificate being created\&. This operation 
should be performed by a CA\&. If no serial number is provided a default serial 
number is made from the current time\&. Serial numbers are limited to integers

Line 353, length 177

Specify the nickname of a certificate or key to list, create, add to a 
database, modify, or validate\&. Bracket the nickname string with quotation 
marks if it contains spaces\&.

Line 355, length 289

The nickname can also be a PKCS #11 URI\&. For example, if you have a 
certificate named "my\-server\-cert" on the internal certificate store, it can 
be unambiguously specified as 
"pkcs11:token=NSS%20Certificate%20DB;object=my\-server\-cert"\&. For details 
about the format, see RFC 7512\&.

Line 360, length 244

Specify the output file name for new certificates or binary certificate 
requests\&. Bracket the output\-file string with quotation marks if it contains 
spaces\&. If this argument is not used the output destination defaults to 
standard output\&.

Line 365, length 172

Specify the prefix used on the certificate and key database file\&. This 
argument is provided to support legacy servers\&. Most applications do not use 
a database prefix\&.

Line 370, length 158

Specify a contact telephone number to include in new certificates or 
certificate requests\&. Bracket this string with quotation marks if it contains 
spaces\&.

Line 375, length 114

Read an alternate PQG value from the specified file when generating DSA key 
pairs\&. If this argument is not used,

Line 377, length 83

generates its own PQG value\&. PQG files are created with a separate DSA 
utility\&.

Line 379, length 87

Elliptic curve name is one of the ones from nistp256, nistp384, nistp521, 
curve25519\&.

Line 381, length 840

If a token is available that supports more curves, the foolowing curves are 
supported as well: sect163k1, nistk163, sect163r1, sect163r2, nistb163, 
sect193r1, sect193r2, sect233k1, nistk233, sect233r1, nistb233, sect239k1, 
sect283k1, nistk283, sect283r1, nistb283, sect409k1, nistk409, sect409r1, 
nistb409, sect571k1, nistk571, sect571r1, nistb571, secp160k1, secp160r1, 
secp160r2, secp192k1, secp192r1, nistp192, secp224k1, secp224r1, nistp224, 
secp256k1, secp256r1, secp384r1, secp521r1, prime192v1, prime192v2, prime192v3, 
prime239v1, prime239v2, prime239v3, c2pnb163v1, c2pnb163v2, c2pnb163v3, 
c2pnb176v1, c2tnb191v1, c2tnb191v2, c2tnb191v3, c2pnb208w1, c2tnb239v1, 
c2tnb239v2, c2tnb239v3, c2pnb272w1, c2pnb304w1, c2tnb359w1, c2pnb368w1, 
c2tnb431r1, secp112r1, secp112r2, secp128r1, secp128r2, sect113r1, sect113r2, 
sect131r1, sect131r2

Line 386, length 118

Display a certificate\*(Aqs binary DER encoding when listing information about 
that certificate with the \-L option\&.

Line 391, length 208

Identify a particular certificate owner for new certificates or certificate 
requests\&. Bracket this string with quotation marks if it contains spaces\&. 
The subject identification format follows RFC #1485\&.

Line 396, length 229

Specify the trust attributes to modify in an existing certificate or to apply 
to a certificate when creating it or adding it to a database\&. There are three 
available trust categories for each certificate, expressed in the order

Line 398, length 98

for each trust setting\&. In each category position, use none, any, or all of 
the attribute codes:

Line 460, length 140

The attribute codes for the categories are separated by commas, and the entire 
set of attributes enclosed by quotation marks\&. For example:

Line 464, length 110

Use the \-L option to see a list of the current certificates and trust 
attributes in a certificate database\&.

Line 466, length 195

Note that the output of the \-L option may include "u" flag, which means that 
there is a private key associated with the certificate\&. It is a dynamic flag 
and you cannot set it with certutil\&.

Line 471, length 85

Specify a usage context to apply when validating a certificate with the \-V 
option\&.

Line 598, length 162

Set the number of months a new certificate will be valid\&. The validity period 
begins at the current system time unless an offset is added or subtracted with 
the

Line 600, length 86

option\&. If this argument is not used, the default validity period is three 
months\&.

Line 605, length 420

Set an offset from the current system time, in months, for the beginning of a 
certificate\*(Aqs validity period\&. Use when creating the certificate or 
adding it to a database\&. Express the offset in integers, using a minus sign 
(\-) to indicate a negative offset\&. If this argument is not used, the 
validity period begins at the current system time\&. The length of the validity 
period is set with the \-v argument\&.

Line 610, length 91

Force the key and certificate database to open in read\-write mode\&. This is 
used with the

Line 621, length 137

to generate the signature for a certificate being created or added to a 
database, rather than obtaining a signature from a separate CA\&.

Line 626, length 179

Set an alternate exponent value to use in generating a new RSA public key for 
the database, instead of the default value of 65537\&. The available alternate 
values are 3 and 17\&.

Line 635, length 145

option) to be used with the RSA\-PSS signature scheme\&. This only works when 
the private key of the certificate or certificate request is RSA\&.

Line 644, length 194

option)\&. This only works when the private key of the signer\*(Aqs certificate 
is RSA\&. If the signer\*(Aqs certificate is restricted to RSA\-PSS, it is not 
necessary to specify this option\&.

Line 649, length 246

Read a seed value from the specified file to generate a new private and public 
key pair\&. This argument makes it possible to use hardware\-generated seed 
values or manually create a value from the keyboard\&. The minimum file size is 
20 bytes\&.

Line 654, length 96

Specify the hash algorithm to use with the \-C, \-S or \-R command options\&. 
Possible keywords:

Line 752, length 104

Set an X\&.509 V3 Certificate Type Extension in the certificate\&. There are 
several available keywords:

Line 845, length 167

Add a basic constraint extension to a certificate that is being created or 
added to a database\&. This extension supports the certificate chain 
verification process\&.

Line 854, length 369

Add an authority key ID extension to a certificate that is being created or 
added to a database\&. This extension supports the identification of a 
particular certificate, from among multiple certificates associated with one 
subject name, as the correct issuer of a certificate\&. The Certificate 
Database Tool will prompt you to select the authority key ID extension\&.

Line 861, length 208

Add a CRL distribution point extension to a certificate that is being created 
or added to a database\&. This extension identifies the URL of a 
certificate\*(Aqs associated certificate revocation list (CRL)\&.

Line 870, length 149

Add an X\&.509 V3 certificate type extension to a certificate that is being 
created or added to the database\&. There are several available keywords:

Line 965, length 134

Add an extended key usage extension to a certificate that is being created or 
added to the database\&. Several keywords are available:

Line 1148, length 268

Add a comma\-separated list of email addresses to the subject alternative name 
extension of a certificate or certificate request that is being created or 
added to the database\&. Subject alternative name extensions are described in 
Section 4\&.2\&.1\&.7 of RFC 3280\&.

Line 1153, length 262

Add a comma\-separated list of DNS names to the subject alternative name 
extension of a certificate or certificate request that is being created or 
added to the database\&. Subject alternative name extensions are described in 
Section 4\&.2\&.1\&.7 of RFC 3280\&.

Line 1158, length 128

Add the Authority Information Access extension to the certificate\&. X\&.509 
certificate extensions are described in RFC 5280\&.

Line 1163, length 126

Add the Subject Information Access extension to the certificate\&. X\&.509 
certificate extensions are described in RFC 5280\&.

Line 1168, length 120

Add the Certificate Policies extension to the certificate\&. X\&.509 
certificate extensions are described in RFC 5280\&.

Line 1173, length 115

Add the Policy Mappings extension to the certificate\&. X\&.509 certificate 
extensions are described in RFC 5280\&.

Line 1178, length 118

Add the Policy Constraints extension to the certificate\&. X\&.509 certificate 
extensions are described in RFC 5280\&.

Line 1183, length 125

Add the Inhibit Any Policy Access extension to the certificate\&. X\&.509 
certificate extensions are described in RFC 5280\&.

Line 1188, length 114

Add the Subject Key ID extension to the certificate\&. X\&.509 certificate 
extensions are described in RFC 5280\&.

Line 1193, length 113

Add a Name Constraint extension to the certificate\&. X\&.509 certificate 
extensions are described in RFC 5280\&.

Line 1200, length 108

\-type: directory, dn, dns, edi, ediparty, email, ip, ipaddr, other, 
registerid, rfc822, uri, x400, x400addr

Line 1210, length 237

PKCS #11 key Attributes\&. Comma separated list of key attribute flags, 
selected from the following list of choices: {token | session} {public | 
private} {sensitive | insensitive} {modifiable | unmodifiable} {extractable | 
unextractable}

Line 1215, length 206

PKCS #11 key Operation Flags\&. Comma separated list of one or more of the 
following: {token | session} {public | private} {sensitive | insensitive} 
{modifiable | unmodifiable} {extractable | unextractable}

Line 1249, length 211

Most of the command options in the examples listed here have more arguments 
available\&. The arguments included in these examples are the most common ones 
or are used to illustrate a specific scenario\&. Use the

Line 1255, length 112

Certificates, keys, and security modules related to managing certificates are 
stored in three related databases:

Line 1304, length 319

A certificate request contains most or all of the information that is used to 
generate the final certificate\&. This request is submitted separately to a 
certificate authority and is then approved by some mechanism (automatically or 
by human review)\&. Once the request is approved, then the certificate is 
generated\&.

Line 1310, length 155

$ certutil \-R \-k key\-type\-or\-id [\-q pqgfile|curve\-name] \-g key\-size 
\-s subject [\-h tokenname] \-d directory [\-p phone] [\-o output\-file] [\-a]

Line 1329, length 104

to specify either the key type to generate or, when renewing a certificate, the 
existing key pair to use

Line 1368, length 122

The new certificate request can be output in ASCII format (\fB\-a\fR) or can be 
written to a specified file (\fB\-o\fR)\&.

Line 1376, length 155

$ certutil \-R \-k rsa \-g 1024 \-s "CN=John Smith,O=Example Corp,L=Mountain 
View,ST=California,C=US" \-d $HOME/nssdb \-p 650\-555\-0123 \-a \-o cert\&.cer

Line 1387, length 246

A valid certificate must be issued by a trusted CA\&. This can be done by 
specifying a CA certificate (\fB\-c\fR) that is stored in the certificate 
database\&. If a CA key pair is not available, you can create a self\-signed 
certificate using the

Line 1397, length 350

$ certutil \-S \-k rsa|dsa|ec \-n certname \-s subject [\-c issuer |\-x] \-t 
trustargs \-d directory [\-m serial\-number] [\-v valid\-months] [\-w 
offset\-months] [\-p phone] [\-1] [\-2] [\-3] [\-4] [\-5 keyword] [\-6 keyword] 
[\-7 emailAddress] [\-8 dns\-names] [\-\-extAIA] [\-\-extSIA] [\-\-extCP] 
[\-\-extPM] [\-\-extPC] [\-\-extIA] [\-\-extSKID]

Line 1405, length 140

options set certificate extensions that can be added to the certificate when it 
is generated by the CA\&. Interactive prompts will result\&.

Line 1413, length 88

$ certutil \-S \-s "CN=Example CA" \-n my\-ca\-cert \-x \-t "C,C,C" \-1 \-2 \-5 
\-m 3650

Line 1419, length 124

The interative prompts for key usage and whether any extensions are critical 
and responses have been ommitted for brevity\&.

Line 1427, length 111

$ certutil \-S \-s "CN=My Server Cert" \-n my\-server\-cert \-c "my\-ca\-cert" 
\-t ",," \-1 \-5 \-6 \-8 \-m 730

Line 1435, length 160

When a certificate request is created, a certificate can be generated by using 
the request and then referencing a certificate authority signing certificate 
(the

Line 1439, length 102

argument)\&. The issuing certificate must be in the certificate database in the 
specified directory\&.

Line 1445, length 228

certutil \-C \-c issuer \-i cert\-request\-file \-o output\-file [\-m 
serial\-number] [\-v valid\-months] [\-w offset\-months] \-d directory [\-1] 
[\-2] [\-3] [\-4] [\-5 keyword] [\-6 keyword] [\-7 emailAddress] [\-8 
dns\-names]

Line 1457, length 202

$ certutil \-C \-c "my\-ca\-cert" \-i /home/certs/cert\&.req \-o cert\&.cer \-m 
010 \-v 12 \-w 1 \-d $HOME/nssdb \-1 nonRepudiation,dataEncipherment \-5 
sslClient \-6 clientAuth \-7 jsmith@example\&.com

Line 1467, length 135

command option lists all of the certificates listed in the certificate 
database\&. The path to the directory (\fB\-d\fR) is required\&.

Line 1489, length 91

can return and print the information for a single, specific certificate\&. For 
example, the

Line 1594, length 148

Keys are the original material used to encrypt certificate data\&. The keys 
generated for certificates are stored separately, in the key database\&.

Line 1607, length 119

certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and 
Certificate Services                  "

Line 1608, length 119

< 0> rsa      455a6673bde9375c2887ec8bf8016b3f9f35861d   Thawte Freemail 
Member\*(Aqs Thawte Consulting (Pty) Ltd\&. ID

Line 1609, length 90

< 1> rsa      40defeeb522ade11090eacebaaf1196a172127df   Example Domain 
Administrator Cert

Line 1662, length 181

The devices that can be used to store certificates \-\- both internal databases 
and external devices like smart cards \-\- are recognized and used by loading 
security modules\&. The

Line 1676, length 117

     uri: 
pkcs11:token=NSS%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203

Line 1680, length 128

     uri: 
pkcs11:token=NSS%20Generic%20Crypto%20Services;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203

Line 1688, length 151

Existing certificates or certificate requests can be added manually to the 
certificate database, even if they were generated elsewhere\&. This uses the

Line 1708, length 112

$ certutil \-A \-n "CN=My SSL Certificate" \-t ",," \-d /home/my/sharednssdb 
\-i /home/example\-certs/cert\&.cer

Line 1715, length 92

\fB\-E\fR, is used specifically to add email certificates to the certificate 
database\&. The

Line 1720, length 141

\fISSL,S/MIME,Code\-signing\fR, so the middle trust settings relate most to 
email certificates (though the others can be set)\&. For example:

Line 1726, length 117

$ certutil \-E \-n "CN=John Smith Email Cert" \-t ",P," \-d 
/home/my/sharednssdb \-i /home/example\-certs/email\&.cer

Line 1736, length 123

option\&. The only required options are to give the security database directory 
and to identify the certificate nickname\&.

Line 1762, length 423

A certificate contains an expiration date in itself, and expired certificates 
are easily rejected\&. However, certificates can also be revoked before they 
hit their expiration date\&. Checking whether a certificate has been revoked 
requires validating the certificate\&. Validation can also be used to ensure 
that the certificate is only used for the purposes it was initially issued 
for\&. Validation is carried out by the

Line 1770, length 83

certutil \-V \-n certificate\-name [\-b time] [\-e] [\-u cert\-usage] \-d 
directory

Line 1782, length 85

$ certutil \-V \-n "John Smith\*(Aqs Email Cert" \-e \-u S,R \-d 
/home/my/sharednssdb

Line 1790, length 272

The trust settings (which relate to the operations that a certificate is 
allowed to be used for) can be changed after a certificate is created or added 
to the database\&. This is especially useful for CA certificates, but it can be 
performed for any type of certificate\&.

Line 1818, length 164

because every certificate authority itself has a certificate; when a CA issues 
a certificate, it essentially stamps that certificate with its own 
fingerprint\&. The

Line 1820, length 202

prints the full chain of a certificate, going from the initial CA (the root CA) 
through ever intermediary CA to the actual certificate\&. For example, for an 
email certificate with two CAs in the chain:

Line 1827, length 205

"Builtin Object Token:Thawte Personal Freemail CA" 
[E=personal\-freemail@thawte\&.com,CN=Thawte Personal Freemail 
CA,OU=Certification Services Division,O=Thawte Consulting,L=Cape 
Town,ST=Western Cape,C=ZA]

Line 1829, length 139

  "Thawte Personal Freemail Issuing CA \- Thawte Consulting" [CN=Thawte 
Personal Freemail Issuing CA,O=Thawte Consulting (Pty) Ltd\&.,C=ZA]

Line 1839, length 415

The device which stores certificates \-\- both external hardware devices and 
internal software databases \-\- can be blanked and reused\&. This operation is 
performed on the device which stores the data, not directly on the security 
databases, so the location must be referenced through the token name 
(\fB\-h\fR) as well as any directory path\&. If there is no external token 
used, the default value is internal\&.

Line 1851, length 185

Many networks have dedicated personnel who handle changes to security tokens 
(the security officer)\&. This person must supply the password to access the 
specified token\&. For example:

Line 1865, length 203

Many networks or applications may be using older BerkeleyDB versions of the 
certificate database (cert8\&.db)\&. Databases can be upgraded to the new 
SQLite version of the database (cert9\&.db) using the

Line 1875, length 99

command must give information about the original database and then use the 
standard arguments (like

Line 1876, length 185

\fB\-d\fR) to give the information about the new databases\&. The command also 
requires information that the tool uses for the process to upgrade and write 
over the original database\&.

Line 1882, length 180

certutil \-\-upgrade\-merge \-d directory [\-P dbprefix] \-\-source\-dir 
directory \-\-source\-prefix dbprefix \-\-upgrade\-id id 
\-\-upgrade\-token\-name name [\-@ password\-file]

Line 1894, length 173

$ certutil \-\-upgrade\-merge \-d /home/my/sharednssdb \-\-source\-dir 
/opt/my\-app/alias/ \-\-source\-prefix serverapp\- \-\-upgrade\-id 1 
\-\-upgrade\-token\-name internal

Line 1902, length 199

command only requires information about the location of the original database; 
since it doesn\*(Aqt change the format of the database, it can write over 
information without performing interim step\&.

Line 1908, length 122

certutil \-\-merge \-d directory [\-P dbprefix] \-\-source\-dir directory 
\-\-source\-prefix dbprefix [\-@ password\-file]

Line 1920, length 112

$ certutil \-\-merge \-d /home/my/sharednssdb \-\-source\-dir 
/opt/my\-app/alias/ \-\-source\-prefix serverapp\-

Line 1943, length 100

NSS originally used BerkeleyDB databases to store security information\&. The 
last versions of these

Line 1980, length 382

BerkeleyDB has performance limitations, though, which prevent it from being 
easily used by multiple applications simultaneously\&. NSS has some flexibility 
that allows applications to use their own, independent database engine while 
keeping a shared database and working around the access issues\&. Still, NSS 
requires more flexibility to provide a truly shared security database\&.

Line 1982, length 162

In 2009, NSS introduced a new set of databases that are SQLite databases rather 
than BerkeleyDB\&. These new databases provide more accessibility and 
performance:

Line 2014, length 123

pkcs11\&.txt, a listing of all of the PKCS #11 modules, contained in a new 
subdirectory in the security databases directory

Line 2019, length 115

database type\&. The shared database type is preferred; the legacy format is 
included for backward compatibility\&.

Line 2023, length 145

\fBmodutil\fR) assume that the given security databases use the SQLite type\&. 
Using the legacy databases must be manually specified by using the

Line 2067, length 94

For an engineering draft on the changes in the shared NSS databases, see the 
NSS project wiki:

Line 2121, length 102

The NSS wiki has information on the new database design and how to configure 
applications to use it\&.

Line 2146, length 102

For information about NSS and other tools related to NSS (like JSS), check out 
the NSS project wiki at

Line 2147, length 140

\m[blue]\fBhttp://www\&.mozilla\&.org/projects/security/pki/nss/\fR\m[]\&;. The 
NSS site relates directly to NSS code changes and releases\&.

Line 2154, length 115

The NSS tools were written and maintained by developers with Netscape, Red Hat, 
Sun, Oracle, Mozilla, and Google\&.

Line 2156, length 86

Authors: Elio Maldonado <emaldona@redhat\&.com>, Deon Lackey 
<dlackey@redhat\&.com>\&.

Line 2159, length 170

Licensed under the Mozilla Public License, v\&. 2\&.0\&. If a copy of the MPL 
was not distributed with this file, You can obtain one at 
http://mozilla\&.org/MPL/2\&.0/\&;.


-.-.

 Use \(en (en-dash) for a dash at the beginning of a line
or between space characters,
not a minus (\-) or a hyphen (-), except in the NAME section.

certutil.1:409:\- Valid peer
certutil.1:421:\- Trusted peer (implies p)
certutil.1:433:\- Valid CA
certutil.1:445:\- Trusted CA (implies c)
certutil.1:457:\- trusted CA for client authentication (ssl server only)

-.-.

Show if docman-to-man created this

4:.\" Generator: DocBook XSL Stylesheets vsnapshot <http://docbook.sf.net/>

-.-.

Put a parenthetical sentence, phrase on a separate line,
if not part of a code.
See man-pages(7), item "semantic newline".

certutil.1:114:List the key ID of keys in the key database\&. A key ID is the 
modulus of the RSA key or the publicValue of the DSA key\&. IDs are displayed 
in hexadecimal ("0x" is not shown)\&.
certutil.1:338:The valid key type options are rsa, dsa, ec, or all\&. The 
default value is rsa\&. Specifying the type of key can avoid mistakes caused by 
duplicate nicknames\&. Giving a key type generates a new key pair; giving the 
ID of an existing key reuses that key pair (which is required to renew 
certificates)\&.
certutil.1:457:\- trusted CA for client authentication (ssl server only)
certutil.1:605:Set an offset from the current system time, in months, for the 
beginning of a certificate\*(Aqs validity period\&. Use when creating the 
certificate or adding it to a database\&. Express the offset in integers, using 
a minus sign (\-) to indicate a negative offset\&. If this argument is not 
used, the validity period begins at the current system time\&. The length of 
the validity period is set with the \-v argument\&.
certutil.1:861:Add a CRL distribution point extension to a certificate that is 
being created or added to a database\&. This extension identifies the URL of a 
certificate\*(Aqs associated certificate revocation list (CRL)\&.
certutil.1:1304:A certificate request contains most or all of the information 
that is used to generate the final certificate\&. This request is submitted 
separately to a certificate authority and is then approved by some mechanism 
(automatically or by human review)\&. Once the request is approved, then the 
certificate is generated\&.
certutil.1:1608:< 0> rsa      455a6673bde9375c2887ec8bf8016b3f9f35861d   Thawte 
Freemail Member\*(Aqs Thawte Consulting (Pty) Ltd\&. ID
certutil.1:1720:\fISSL,S/MIME,Code\-signing\fR, so the middle trust settings 
relate most to email certificates (though the others can be set)\&. For example:
certutil.1:1790:The trust settings (which relate to the operations that a 
certificate is allowed to be used for) can be changed after a certificate is 
created or added to the database\&. This is especially useful for CA 
certificates, but it can be performed for any type of certificate\&.
certutil.1:1851:Many networks have dedicated personnel who handle changes to 
security tokens (the security officer)\&. This person must supply the password 
to access the specified token\&. For example:

-.-.

Protect "^From " from forcing a mail software to use "quoted-printable"
encoding, by adding "\&" in front of it.

1421:From there, new certificates can reference the self\-signed certificate:

-.-.

No space is needed before a quote (") at the end of a line

1607:certutil: Checking token "NSS Certificate DB" in slot "NSS User Private 
Key and Certificate Services                  "

-.-.

No need for "\&" to be in front of a period (.) if not at the beginning of
a line.

37:This documentation is still work in progress\&. Please contribute to the 
initial review in
44:Certificate issuance, part of the key and certificate management process, 
requires that keys and certificates be created in the key database\&. This 
document discusses certificate and key database management\&. For information 
on the security module database management, see the
51:always requires one and only one command option to specify the type of 
certificate operation\&. Each command option may take zero or more arguments\&. 
The command option
59:Add an existing certificate to a certificate database\&. The certificate 
database should already exist; if one is not present, this command option will 
initialize one by default\&.
64:Run a series of commands from the specified batch file\&. This requires the
71:Create a new binary certificate file from a binary certificate request 
file\&. Use the
73:argument to specify the certificate request file\&. If this argument is not 
used,
95:Delete a private key and the associated certificate from a database\&. 
Specify the key to delete with the \-n argument or the \-k argument\&. Specify 
the database from which to delete the key with the
99:Some smart cards do not let you remove a public key you have generated\&. In 
such a case, only the private key is deleted from the key pair\&.
104:Generate a new public and private key pair within a key database\&. The key 
database should already exist; if one is not present, this command option will 
initialize one by default\&. Some smart cards can store only one key pair\&. If 
you create a new key pair for such a card, the previous pair is overwritten\&.
114:List the key ID of keys in the key database\&. A key ID is the modulus of 
the RSA key or the publicValue of the DSA key\&. IDs are displayed in 
hexadecimal ("0x" is not shown)\&.
119:List all the certificates, or display information about a named 
certificate, in a certificate database\&. Use the \-h tokenname argument to 
specify the certificate database on a particular hardware or software token\&.
139:Create a certificate request file that can be submitted to a Certificate 
Authority (CA) for processing into a finished certificate\&. Output defaults to 
standard out unless you use \-o output\-file argument\&. Use the \-a argument 
to specify ASCII output\&.
174:Upgrade an old database and merge it into a new database\&. This is used to 
migrate legacy NSS databases (cert8\&.db
176:key3\&.db) into the newer SQLite databases (cert9\&.db
178:key4\&.db)\&.
187:Use ASCII format or allow the use of ASCII format for input or output\&. 
This formatting follows RFC 1113\&. For certificate requests, ASCII output 
defaults to standard output unless redirected\&.
197:Specify a time at which a certificate is required to be valid\&. Use when 
checking certificate validity with the
199:option\&. The format of the
214:Identify the certificate of the CA from which a new certificate will derive 
its authenticity\&. Use the exact nickname or alias of the CA certificate, or 
use the CA\*(Aqs email address\&. Bracket the issuer string with quotation 
marks if it contains spaces\&.
222:supports two types of databases: the legacy security databases (cert8\&.db,
223:key3\&.db, and
224:secmod\&.db) and new SQLite databases (cert9\&.db,
225:key4\&.db, and
226:pkcs11\&.txt)\&.
254:If no prefix is specified the default type is retrieved from 
NSS_DEFAULT_DB_TYPE\&. If NSS_DEFAULT_DB_TYPE is not set then
271:Specify the email address of a certificate to list\&. Used with the \-L 
command option\&.
286:OID (example): 1\&.2\&.3\&.4
314:Specify a file that will automatically supply the password to include in a 
certificate or to access a certificate database\&. This is a plain\-text file 
containing one password\&. Be sure to prevent unauthorized access to this 
file\&.
319:Set a key size to use when generating new public and private key pairs\&. 
The minimum is 512 bits and the maximum is 16384 bits\&. The default is 2048 
bits\&. Any size between the minimum and maximum is allowed\&.
324:Specify the name of a token to use or act on\&. If not specified the 
default token is the internal database slot\&.
326:The name can also be a PKCS #11 URI\&. For example, the NSS internal 
certificate store can be unambiguously specified as 
"pkcs11:token=NSS%20Certificate%20DB"\&. For details about the format, see RFC 
7512\&.
331:Pass an input file to the command\&. Depending on the command option, an 
input file can be a specific certificate, a certificate request file, or a 
batch file of commands\&.
338:The valid key type options are rsa, dsa, ec, or all\&. The default value is 
rsa\&. Specifying the type of key can avoid mistakes caused by duplicate 
nicknames\&. Giving a key type generates a new key pair; giving the ID of an 
existing key reuses that key pair (which is required to renew certificates)\&.
348:Assign a unique serial number to a certificate being created\&. This 
operation should be performed by a CA\&. If no serial number is provided a 
default serial number is made from the current time\&. Serial numbers are 
limited to integers
353:Specify the nickname of a certificate or key to list, create, add to a 
database, modify, or validate\&. Bracket the nickname string with quotation 
marks if it contains spaces\&.
355:The nickname can also be a PKCS #11 URI\&. For example, if you have a 
certificate named "my\-server\-cert" on the internal certificate store, it can 
be unambiguously specified as 
"pkcs11:token=NSS%20Certificate%20DB;object=my\-server\-cert"\&. For details 
about the format, see RFC 7512\&.
360:Specify the output file name for new certificates or binary certificate 
requests\&. Bracket the output\-file string with quotation marks if it contains 
spaces\&. If this argument is not used the output destination defaults to 
standard output\&.
365:Specify the prefix used on the certificate and key database file\&. This 
argument is provided to support legacy servers\&. Most applications do not use 
a database prefix\&.
370:Specify a contact telephone number to include in new certificates or 
certificate requests\&. Bracket this string with quotation marks if it contains 
spaces\&.
375:Read an alternate PQG value from the specified file when generating DSA key 
pairs\&. If this argument is not used,
377:generates its own PQG value\&. PQG files are created with a separate DSA 
utility\&.
391:Identify a particular certificate owner for new certificates or certificate 
requests\&. Bracket this string with quotation marks if it contains spaces\&. 
The subject identification format follows RFC #1485\&.
396:Specify the trust attributes to modify in an existing certificate or to 
apply to a certificate when creating it or adding it to a database\&. There are 
three available trust categories for each certificate, expressed in the order
398:for each trust setting\&. In each category position, use none, any, or all 
of the attribute codes:
460:The attribute codes for the categories are separated by commas, and the 
entire set of attributes enclosed by quotation marks\&. For example:
466:Note that the output of the \-L option may include "u" flag, which means 
that there is a private key associated with the certificate\&. It is a dynamic 
flag and you cannot set it with certutil\&.
598:Set the number of months a new certificate will be valid\&. The validity 
period begins at the current system time unless an offset is added or 
subtracted with the
600:option\&. If this argument is not used, the default validity period is 
three months\&.
605:Set an offset from the current system time, in months, for the beginning of 
a certificate\*(Aqs validity period\&. Use when creating the certificate or 
adding it to a database\&. Express the offset in integers, using a minus sign 
(\-) to indicate a negative offset\&. If this argument is not used, the 
validity period begins at the current system time\&. The length of the validity 
period is set with the \-v argument\&.
610:Force the key and certificate database to open in read\-write mode\&. This 
is used with the
626:Set an alternate exponent value to use in generating a new RSA public key 
for the database, instead of the default value of 65537\&. The available 
alternate values are 3 and 17\&.
635:option) to be used with the RSA\-PSS signature scheme\&. This only works 
when the private key of the certificate or certificate request is RSA\&.
644:option)\&. This only works when the private key of the signer\*(Aqs 
certificate is RSA\&. If the signer\*(Aqs certificate is restricted to 
RSA\-PSS, it is not necessary to specify this option\&.
649:Read a seed value from the specified file to generate a new private and 
public key pair\&. This argument makes it possible to use hardware\-generated 
seed values or manually create a value from the keyboard\&. The minimum file 
size is 20 bytes\&.
654:Specify the hash algorithm to use with the \-C, \-S or \-R command 
options\&. Possible keywords:
752:Set an X\&.509 V3 Certificate Type Extension in the certificate\&. There 
are several available keywords:
845:Add a basic constraint extension to a certificate that is being created or 
added to a database\&. This extension supports the certificate chain 
verification process\&.
854:Add an authority key ID extension to a certificate that is being created or 
added to a database\&. This extension supports the identification of a 
particular certificate, from among multiple certificates associated with one 
subject name, as the correct issuer of a certificate\&. The Certificate 
Database Tool will prompt you to select the authority key ID extension\&.
861:Add a CRL distribution point extension to a certificate that is being 
created or added to a database\&. This extension identifies the URL of a 
certificate\*(Aqs associated certificate revocation list (CRL)\&.
870:Add an X\&.509 V3 certificate type extension to a certificate that is being 
created or added to the database\&. There are several available keywords:
965:Add an extended key usage extension to a certificate that is being created 
or added to the database\&. Several keywords are available:
1148:Add a comma\-separated list of email addresses to the subject alternative 
name extension of a certificate or certificate request that is being created or 
added to the database\&. Subject alternative name extensions are described in 
Section 4\&.2\&.1\&.7 of RFC 3280\&.
1153:Add a comma\-separated list of DNS names to the subject alternative name 
extension of a certificate or certificate request that is being created or 
added to the database\&. Subject alternative name extensions are described in 
Section 4\&.2\&.1\&.7 of RFC 3280\&.
1158:Add the Authority Information Access extension to the certificate\&. 
X\&.509 certificate extensions are described in RFC 5280\&.
1163:Add the Subject Information Access extension to the certificate\&. X\&.509 
certificate extensions are described in RFC 5280\&.
1168:Add the Certificate Policies extension to the certificate\&. X\&.509 
certificate extensions are described in RFC 5280\&.
1173:Add the Policy Mappings extension to the certificate\&. X\&.509 
certificate extensions are described in RFC 5280\&.
1178:Add the Policy Constraints extension to the certificate\&. X\&.509 
certificate extensions are described in RFC 5280\&.
1183:Add the Inhibit Any Policy Access extension to the certificate\&. X\&.509 
certificate extensions are described in RFC 5280\&.
1188:Add the Subject Key ID extension to the certificate\&. X\&.509 certificate 
extensions are described in RFC 5280\&.
1193:Add a Name Constraint extension to the certificate\&. X\&.509 certificate 
extensions are described in RFC 5280\&.
1210:PKCS #11 key Attributes\&. Comma separated list of key attribute flags, 
selected from the following list of choices: {token | session} {public | 
private} {sensitive | insensitive} {modifiable | unmodifiable} {extractable | 
unextractable}
1215:PKCS #11 key Operation Flags\&. Comma separated list of one or more of the 
following: {token | session} {public | private} {sensitive | insensitive} 
{modifiable | unmodifiable} {extractable | unextractable}
1249:Most of the command options in the examples listed here have more 
arguments available\&. The arguments included in these examples are the most 
common ones or are used to illustrate a specific scenario\&. Use the
1265:cert8\&.db or cert9\&.db
1276:key3\&.db or key4\&.db
1287:secmod\&.db or pkcs11\&.txt
1304:A certificate request contains most or all of the information that is used 
to generate the final certificate\&. This request is submitted separately to a 
certificate authority and is then approved by some mechanism (automatically or 
by human review)\&. Once the request is approved, then the certificate is 
generated\&.
1376:$ certutil \-R \-k rsa \-g 1024 \-s "CN=John Smith,O=Example 
Corp,L=Mountain View,ST=California,C=US" \-d $HOME/nssdb \-p 650\-555\-0123 \-a 
\-o cert\&.cer
1378:Generating key\&.  This may take a few moments\&.\&.\&.
1387:A valid certificate must be issued by a trusted CA\&. This can be done by 
specifying a CA certificate (\fB\-c\fR) that is stored in the certificate 
database\&. If a CA key pair is not available, you can create a self\-signed 
certificate using the
1405:options set certificate extensions that can be added to the certificate 
when it is generated by the CA\&. Interactive prompts will result\&.
1439:argument)\&. The issuing certificate must be in the certificate database 
in the specified directory\&.
1457:$ certutil \-C \-c "my\-ca\-cert" \-i /home/certs/cert\&.req \-o 
cert\&.cer \-m 010 \-v 12 \-w 1 \-d $HOME/nssdb \-1 
nonRepudiation,dataEncipherment \-5 sslClient \-6 clientAuth \-7 
jsmith@example\&.com
1467:command option lists all of the certificates listed in the certificate 
database\&. The path to the directory (\fB\-d\fR) is required\&.
1489:can return and print the information for a single, specific certificate\&. 
For example, the
1594:Keys are the original material used to encrypt certificate data\&. The 
keys generated for certificates are stored separately, in the key database\&.
1608:< 0> rsa      455a6673bde9375c2887ec8bf8016b3f9f35861d   Thawte Freemail 
Member\*(Aqs Thawte Consulting (Pty) Ltd\&. ID
1662:The devices that can be used to store certificates \-\- both internal 
databases and external devices like smart cards \-\- are recognized and used by 
loading security modules\&. The
1665:secmod\&.db
1666:database\&. The path to the directory (\fB\-d\fR) is required\&.
1688:Existing certificates or certificate requests can be added manually to the 
certificate database, even if they were generated elsewhere\&. This uses the
1708:$ certutil \-A \-n "CN=My SSL Certificate" \-t ",," \-d 
/home/my/sharednssdb \-i /home/example\-certs/cert\&.cer
1719:command\&. The trust arguments for certificates have the format
1726:$ certutil \-E \-n "CN=John Smith Email Cert" \-t ",P," \-d 
/home/my/sharednssdb \-i /home/example\-certs/email\&.cer
1736:option\&. The only required options are to give the security database 
directory and to identify the certificate nickname\&.
1762:A certificate contains an expiration date in itself, and expired 
certificates are easily rejected\&. However, certificates can also be revoked 
before they hit their expiration date\&. Checking whether a certificate has 
been revoked requires validating the certificate\&. Validation can also be used 
to ensure that the certificate is only used for the purposes it was initially 
issued for\&. Validation is carried out by the
1790:The trust settings (which relate to the operations that a certificate is 
allowed to be used for) can be changed after a certificate is created or added 
to the database\&. This is especially useful for CA certificates, but it can be 
performed for any type of certificate\&.
1818:because every certificate authority itself has a certificate; when a CA 
issues a certificate, it essentially stamps that certificate with its own 
fingerprint\&. The
1820:prints the full chain of a certificate, going from the initial CA (the 
root CA) through ever intermediary CA to the actual certificate\&. For example, 
for an email certificate with two CAs in the chain:
1826:$ certutil \-d /home/my/sharednssdb \-O \-n "jsmith@example\&.com"
1827:"Builtin Object Token:Thawte Personal Freemail CA" 
[E=personal\-freemail@thawte\&.com,CN=Thawte Personal Freemail 
CA,OU=Certification Services Division,O=Thawte Consulting,L=Cape 
Town,ST=Western Cape,C=ZA]
1829:  "Thawte Personal Freemail Issuing CA \- Thawte Consulting" [CN=Thawte 
Personal Freemail Issuing CA,O=Thawte Consulting (Pty) Ltd\&.,C=ZA]
1831:    "(null)" [E=jsmith@example\&.com,CN=Thawte Freemail Member]
1839:The device which stores certificates \-\- both external hardware devices 
and internal software databases \-\- can be blanked and reused\&. This 
operation is performed on the device which stores the data, not directly on the 
security databases, so the location must be referenced through the token name 
(\fB\-h\fR) as well as any directory path\&. If there is no external token 
used, the default value is internal\&.
1851:Many networks have dedicated personnel who handle changes to security 
tokens (the security officer)\&. This person must supply the password to access 
the specified token\&. For example:
1865:Many networks or applications may be using older BerkeleyDB versions of 
the certificate database (cert8\&.db)\&. Databases can be upgraded to the new 
SQLite version of the database (cert9\&.db) using the
1868:cert9\&.db
1930:command option\&. The only argument for this specifies the input file\&.
1943:NSS originally used BerkeleyDB databases to store security information\&. 
The last versions of these
1955:cert8\&.db for certificates
1966:key3\&.db for keys
1977:secmod\&.db for PKCS #11 module information
1980:BerkeleyDB has performance limitations, though, which prevent it from 
being easily used by multiple applications simultaneously\&. NSS has some 
flexibility that allows applications to use their own, independent database 
engine while keeping a shared database and working around the access issues\&. 
Still, NSS requires more flexibility to provide a truly shared security 
database\&.
1982:In 2009, NSS introduced a new set of databases that are SQLite databases 
rather than BerkeleyDB\&. These new databases provide more accessibility and 
performance:
1992:cert9\&.db for certificates
2003:key4\&.db for keys
2014:pkcs11\&.txt, a listing of all of the PKCS #11 modules, contained in a new 
subdirectory in the security databases directory
2019:database type\&. The shared database type is preferred; the legacy format 
is included for backward compatibility\&.
2025:prefix with the given security directory\&. For example:
2053:~/\&.bashrc
2064:https://wiki\&.mozilla\&.org/NSS_Shared_DB_Howto
2077:https://wiki\&.mozilla\&.org/NSS_Shared_DB
2096:http://tools\&.ietf\&.org/html/rfc5280
2107:http://tools\&.ietf\&.org/html/rfc1113
2118:http://tools\&.ietf\&.org/html/rfc1485
2131:https://wiki\&.mozilla\&.org/NSS_Shared_DB_Howto
2142:https://wiki\&.mozilla\&.org/NSS_Shared_DB
2149:Mailing lists: https://lists\&.mozilla\&.org/listinfo/dev\-tech\-crypto
2156:Authors: Elio Maldonado <emaldona@redhat\&.com>, Deon Lackey 
<dlackey@redhat\&.com>\&.
2159:Licensed under the Mozilla Public License, v\&. 2\&.0\&. If a copy of the 
MPL was not distributed with this file, You can obtain one at 
http://mozilla\&.org/MPL/2\&.0/\&;.

-.-.

Output from "test-groff  -mandoc -t -K utf8 -rF0 -rHY=0 -ww -z ":

troff:<stdin>:1480: warning: trailing space in the line
troff:<stdin>:1674: warning: trailing space in the line
troff:<stdin>:1678: warning: trailing space in the line

-.-.

Additional:

>From "codespell":
interative ==> interactive, iterative
ommitted ==> omitted

-.-

Wrong spelling: foolowing --> following

-,-

Shorten input lines in nofill mode, to fit them on a sheet.

-.-

  Additionally (general):

  There is no need to add a '\&' before a full stop (.) if it has a character
before it!
--- certutil.1  2024-12-05 23:07:20.340678736 +0000
+++ certutil.1.new      2024-12-06 00:10:16.277200979 +0000
@@ -378,7 +378,7 @@ generates its own PQG value\&. PQG files
 .sp
 Elliptic curve name is one of the ones from nistp256, nistp384, nistp521, 
curve25519\&.
 .sp
-If a token is available that supports more curves, the foolowing curves are 
supported as well: sect163k1, nistk163, sect163r1, sect163r2, nistb163, 
sect193r1, sect193r2, sect233k1, nistk233, sect233r1, nistb233, sect239k1, 
sect283k1, nistk283, sect283r1, nistb283, sect409k1, nistk409, sect409r1, 
nistb409, sect571k1, nistk571, sect571r1, nistb571, secp160k1, secp160r1, 
secp160r2, secp192k1, secp192r1, nistp192, secp224k1, secp224r1, nistp224, 
secp256k1, secp256r1, secp384r1, secp521r1, prime192v1, prime192v2, prime192v3, 
prime239v1, prime239v2, prime239v3, c2pnb163v1, c2pnb163v2, c2pnb163v3, 
c2pnb176v1, c2tnb191v1, c2tnb191v2, c2tnb191v3, c2pnb208w1, c2tnb239v1, 
c2tnb239v2, c2tnb239v3, c2pnb272w1, c2pnb304w1, c2tnb359w1, c2pnb368w1, 
c2tnb431r1, secp112r1, secp112r2, secp128r1, secp128r2, sect113r1, sect113r2, 
sect131r1, sect131r2
+If a token is available that supports more curves, the following curves are 
supported as well: sect163k1, nistk163, sect163r1, sect163r2, nistb163, 
sect193r1, sect193r2, sect233k1, nistk233, sect233r1, nistb233, sect239k1, 
sect283k1, nistk283, sect283r1, nistb283, sect409k1, nistk409, sect409r1, 
nistb409, sect571k1, nistk571, sect571r1, nistb571, secp160k1, secp160r1, 
secp160r2, secp192k1, secp192r1, nistp192, secp224k1, secp224r1, nistp224, 
secp256k1, secp256r1, secp384r1, secp521r1, prime192v1, prime192v2, prime192v3, 
prime239v1, prime239v2, prime239v3, c2pnb163v1, c2pnb163v2, c2pnb163v3, 
c2pnb176v1, c2tnb191v1, c2tnb191v2, c2tnb191v3, c2pnb208w1, c2tnb239v1, 
c2tnb239v2, c2tnb239v3, c2pnb272w1, c2pnb304w1, c2tnb359w1, c2pnb368w1, 
c2tnb431r1, secp112r1, secp112r2, secp128r1, secp128r2, sect113r1, sect113r2, 
sect131r1, sect131r2
 .RE
 .PP
 \-r
@@ -406,7 +406,7 @@ for each trust setting\&. In each catego
 .IP \(bu 2.3
 .\}
 \fBp\fR
-\- Valid peer
+\(en Valid peer
 .RE
 .sp
 .RS 4
@@ -418,7 +418,7 @@ for each trust setting\&. In each catego
 .IP \(bu 2.3
 .\}
 \fBP\fR
-\- Trusted peer (implies p)
+\(en Trusted peer (implies p)
 .RE
 .sp
 .RS 4
@@ -430,7 +430,7 @@ for each trust setting\&. In each catego
 .IP \(bu 2.3
 .\}
 \fBc\fR
-\- Valid CA
+\(en Valid CA
 .RE
 .sp
 .RS 4
@@ -442,7 +442,7 @@ for each trust setting\&. In each catego
 .IP \(bu 2.3
 .\}
 \fBC\fR
-\- Trusted CA (implies c)
+\(en Trusted CA (implies c)
 .RE
 .sp
 .RS 4
@@ -454,7 +454,7 @@ for each trust setting\&. In each catego
 .IP \(bu 2.3
 .\}
 \fBT\fR
-\- trusted CA for client authentication (ssl server only)
+\(en trusted CA for client authentication (ssl server only)
 .RE
 .sp
 The attribute codes for the categories are separated by commas, and the entire 
set of attributes enclosed by quotation marks\&. For example:
@@ -1307,7 +1307,8 @@ A certificate request contains most or a
 .RS 4
 .\}
 .nf
-$ certutil \-R \-k key\-type\-or\-id [\-q pqgfile|curve\-name] \-g key\-size 
\-s subject [\-h tokenname] \-d directory [\-p phone] [\-o output\-file] [\-a]
+$ certutil \-R \-k key\-type\-or\-id [\-q pqgfile|curve\-name] \-g key\-size \e
+\-s subject [\-h tokenname] \-d directory [\-p phone] [\-o output\-file] [\-a]
 .fi
 .if n \{\
 .RE
@@ -1373,7 +1374,8 @@ For example:
 .RS 4
 .\}
 .nf
-$ certutil \-R \-k rsa \-g 1024 \-s "CN=John Smith,O=Example Corp,L=Mountain 
View,ST=California,C=US" \-d $HOME/nssdb \-p 650\-555\-0123 \-a \-o cert\&.cer
+$ certutil \-R \-k rsa \-g 1024 \-s "CN=John Smith,O=Example Corp,L=Mountain \e
+View,ST=California,C=US" \-d $HOME/nssdb \-p 650\-555\-0123 \-a \-o cert.cer
 
 Generating key\&.  This may take a few moments\&.\&.\&.
 
@@ -1394,7 +1396,11 @@ command option\&.
 .RS 4
 .\}
 .nf
-$ certutil \-S \-k rsa|dsa|ec \-n certname \-s subject [\-c issuer |\-x] \-t 
trustargs \-d directory [\-m serial\-number] [\-v valid\-months] [\-w 
offset\-months] [\-p phone] [\-1] [\-2] [\-3] [\-4] [\-5 keyword] [\-6 keyword] 
[\-7 emailAddress] [\-8 dns\-names] [\-\-extAIA] [\-\-extSIA] [\-\-extCP] 
[\-\-extPM] [\-\-extPC] [\-\-extIA] [\-\-extSKID]
+$ certutil \-S \-k rsa|dsa|ec \-n certname \-s subject [\-c issuer |\-x] \-t \e
+trustargs \-d directory [\-m serial\-number] [\-v valid\-months] [\-w \e
+offset\-months] [\-p phone] [\-1] [\-2] [\-3] [\-4] [\-5 keyword] [\-6 \e
+keyword] [\-7 emailAddress] [\-8 dns\-names] [\-\-extAIA] [\-\-extSIA] \e
+[\-\-extCP] [\-\-extPM] [\-\-extPC] [\-\-extIA] [\-\-extSKID]
 .fi
 .if n \{\
 .RE
@@ -1416,15 +1422,16 @@ $ certutil \-S \-s "CN=Example CA" \-n m
 .RE
 .\}
 .PP
-The interative prompts for key usage and whether any extensions are critical 
and responses have been ommitted for brevity\&.
+The interactive prompts for key usage and whether any extensions are critical 
and responses have been omitted for brevity\&.
 .PP
-From there, new certificates can reference the self\-signed certificate:
+\&From there, new certificates can reference the self\-signed certificate:
 .sp
 .if n \{\
 .RS 4
 .\}
 .nf
-$ certutil \-S \-s "CN=My Server Cert" \-n my\-server\-cert \-c "my\-ca\-cert" 
\-t ",," \-1 \-5 \-6 \-8 \-m 730
+$ certutil \-S \-s "CN=My Server Cert" \-n my\-server\-cert \-c \e
+"my\-ca\-cert" \-t ",," \-1 \-5 \-6 \-8 \-m 730
 .fi
 .if n \{\
 .RE
@@ -1454,7 +1461,9 @@ For example:
 .RS 4
 .\}
 .nf
-$ certutil \-C \-c "my\-ca\-cert" \-i /home/certs/cert\&.req \-o cert\&.cer 
\-m 010 \-v 12 \-w 1 \-d $HOME/nssdb \-1 nonRepudiation,dataEncipherment \-5 
sslClient \-6 clientAuth \-7 jsmith@example\&.com
+$ certutil \-C \-c "my\-ca\-cert" \-i /home/certs/cert\&.req \-o cert\&.cer \e
+\-m 010 \-v 12 \-w 1 \-d $HOME/nssdb \-1 nonRepudiation,dataEncipherment \-5 \e
+sslClient \-6 clientAuth \-7 jsmith@example\&.com
 .fi
 .if n \{\
 .RE
@@ -1477,7 +1486,7 @@ Certificate Nickname
 
 CA Administrator of Instance pki\-ca1\*(Aqs Example Domain ID     u,u,u
 TPS Administrator\*(Aqs Example Domain ID                        u,u,u
-Google Internet Authority                                    ,,   
+Google Internet Authority                                    ,,
 Certificate Authority \- Example Domain                       CT,C,C
 .fi
 .if n \{\
@@ -1604,7 +1613,7 @@ argument to give the path to the directo
 .\}
 .nf
 $ certutil \-K \-d $HOME/nssdb
-certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key 
and Certificate Services                  "
+certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key 
and Certificate Services"
 < 0> rsa      455a6673bde9375c2887ec8bf8016b3f9f35861d   Thawte Freemail 
Member\*(Aqs Thawte Consulting (Pty) Ltd\&. ID
 < 1> rsa      40defeeb522ade11090eacebaaf1196a172127df   Example Domain 
Administrator Cert
 < 2> rsa      1d0b06f44f6c03842f7d4f4a1dc78b3bcd1b85a5   John Smith user cert
@@ -1671,11 +1680,11 @@ database\&. The path to the directory (\
 .nf
 $ certutil \-U \-d /home/my/sharednssdb
 
-    slot: NSS User Private Key and Certificate Services                  
+    slot: NSS User Private Key and Certificate Services
    token: NSS Certificate DB
      uri: 
pkcs11:token=NSS%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203
 
-    slot: NSS Internal Cryptographic Services                            
+    slot: NSS Internal Cryptographic Services
    token: NSS Generic Crypto Services
      uri: 
pkcs11:token=NSS%20Generic%20Crypto%20Services;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203
 .fi
@@ -1705,7 +1714,8 @@ For example:
 .RS 4
 .\}
 .nf
-$ certutil \-A \-n "CN=My SSL Certificate" \-t ",," \-d /home/my/sharednssdb 
\-i /home/example\-certs/cert\&.cer
+$ certutil \-A \-n "CN=My SSL Certificate" \-t ",," \-d /home/my/sharednssdb \e
+\-i /home/example\-certs/cert\&.cer
 .fi
 .if n \{\
 .RE
@@ -1723,7 +1733,8 @@ command\&. The trust arguments for certi
 .RS 4
 .\}
 .nf
-$ certutil \-E \-n "CN=John Smith Email Cert" \-t ",P," \-d 
/home/my/sharednssdb \-i /home/example\-certs/email\&.cer
+$ certutil \-E \-n "CN=John Smith Email Cert" \-t ",P," \-d \e
+/home/my/sharednssdb \-i /home/example\-certs/email.cer
 .fi
 .if n \{\
 .RE
@@ -1891,7 +1902,9 @@ For example:
 .RS 4
 .\}
 .nf
-$ certutil \-\-upgrade\-merge \-d /home/my/sharednssdb \-\-source\-dir 
/opt/my\-app/alias/ \-\-source\-prefix serverapp\- \-\-upgrade\-id 1 
\-\-upgrade\-token\-name internal
+$ certutil \-\-upgrade\-merge \-d /home/my/sharednssdb \-\-source\-dir \e
+/opt/my\-app/alias/ \-\-source\-prefix serverapp\- \-\-upgrade\-id 1 \e
+\-\-upgrade\-token\-name internal
 .fi
 .if n \{\
 .RE
@@ -1917,7 +1930,8 @@ For example:
 .RS 4
 .\}
 .nf
-$ certutil \-\-merge \-d /home/my/sharednssdb \-\-source\-dir 
/opt/my\-app/alias/ \-\-source\-prefix serverapp\-
+$ certutil \-\-merge \-d /home/my/sharednssdb \-\-source\-dir \e
+/opt/my\-app/alias/ \-\-source\-prefix serverapp\-
 .fi
 .if n \{\
 .RE

Reply via email to