FreeBSD Manual Pages
ocspd.3(3) OpenCA Contributed Manual ocspd.3(3) NAME openca-ocspd - OCSP Daemon SYNOPSIS openca-ocspd [-d] [-p n] [-b address] [-c file] [-md digest] [-k passwd] [-i passin] [-e engine] [-r chroot_dir] [-v] DESCRIPTION The openca-ocspd is an RFC2560 compliant OCSPD responder. It can be used to verify the status of a certificate using OCSP clients (such as Mozilla/Netscape7). OPTIONS -d detach the main process from the calling process. -p n specifies the port to bind to. Default is 2560. -b address specifies the IP address to bind to. Default behaviour is to listen to every IP available (equal to '*' value). -c file specifies the configuration file to be loaded. Default file loaded is /usr/local/etc/ocspd.conf. -md digest specifies the digest to be used when generating responses. Default is sha1. -k passwd specifies the password to be used when loading the private key. -i passin the key password source. For more information about the format of arg see the PASS PHRASE ARGUMENTS section in openssl(1). -engine id specifying an engine (by it's unique id string) will cause the responder to attempt to obtain a functional reference to the specified engine, thus initialising it if needed. The engine will then be set as the default for all available algorithms. -r chroot_dir Chroot the application into the specified directory. -v this prints extra details about the operations being performed. NOTES Actually not extensive testing has been carried out, anyway this daemon is reported to work with Mozilla/Netscape. To reload the certificate's db simply send a SIGHUP to the main process ( kill -s SIGHUP pid ). EXAMPLE openca-ocspd -c contrib/ocspd.conf AUTHOR Massimiliano Pala <madwolf@openca.org> SEE ALSO openca(3),openssl(1), ocsp(1) openca-ocspd 3.1.2 2018-05-24 ocspd.3(3)
NAME | SYNOPSIS | DESCRIPTION | OPTIONS | NOTES | EXAMPLE | AUTHOR | SEE ALSO
Want to link to this manual page? Use this URL:
<https://man.freebsd.org/cgi/man.cgi?query=ocspd&sektion=3&manpath=FreeBSD+Ports+14.3.quarterly>