1=pod
2
3=head1 NAME
4
5nseq - create or examine a netscape certificate sequence
6
7=head1 SYNOPSIS
8
9B<openssl> B<nseq>
10[B<-in filename>]
11[B<-out filename>]
12[B<-toseq>]
13
14=head1 DESCRIPTION
15
16The B<nseq> command takes a file containing a Netscape certificate
17sequence and prints out the certificates contained in it or takes a
18file of certificates and converts it into a Netscape certificate
19sequence.
20
21=head1 COMMAND OPTIONS
22
23=over 4
24
25=item B<-in filename>
26
27This specifies the input filename to read or standard input if this
28option is not specified.
29
30=item B<-out filename>
31
32specifies the output filename or standard output by default.
33
34=item B<-toseq>
35
36normally a Netscape certificate sequence will be input and the output
37is the certificates contained in it. With the B<-toseq> option the
38situation is reversed: a Netscape certificate sequence is created from
39a file of certificates.
40
41=back
42
43=head1 EXAMPLES
44
45Output the certificates in a Netscape certificate sequence
46
47 openssl nseq -in nseq.pem -out certs.pem
48
49Create a Netscape certificate sequence
50
51 openssl nseq -in certs.pem -toseq -out nseq.pem
52
53=head1 NOTES
54
55The B<PEM> encoded form uses the same headers and footers as a certificate:
56
57 -----BEGIN CERTIFICATE-----
58 -----END CERTIFICATE-----
59
60A Netscape certificate sequence is a Netscape specific form that can be sent
61to browsers as an alternative to the standard PKCS#7 format when several
62certificates are sent to the browser: for example during certificate enrollment.
63It is used by Netscape certificate server for example.
64
65=head1 BUGS
66
67This program needs a few more options: like allowing DER or PEM input and
68output files and allowing multiple certificate files to be used.
69
70=cut
71