The following options are supported:
-b backup an existing version of outputfilename
-d [name]
specify which Mozilla tree to pull certdata.txt from (or a
custom URL). Valid names are: aurora, beta, central,
mozilla, nss, release (default). They are shortcuts for
which source tree to get the cert data from.
-f force rebuild even if certdata.txt is current (Added in
version 1.17)
-i print version info about used modules
-k Allow insecure data transfer. By default (since 1.27) this
command will fail if the HTTPS transfer fails. This
overrides that decision (and opens for man-in-the-middle
attacks).
-l print license info about certdata.txt
-m (Added in 1.26) Include meta data comments in the output.
The meta data is specific information about each
certificate that is stored in the original file as
comments and using this option will make those comments
get passed on to the output file. The meta data is not
parsed in any way by mk-ca-bundle.
-n no download of certdata.txt (to use existing)
-p [purposes]:[levels]
list of Mozilla trust purposes and levels for certificates
to include in output. Takes the form of a comma separated
list of purposes, a colon, and a comma separated list of
levels. The default is to include all certificates trusted
to issue SSL Server certificates
(SERVER_AUTH:TRUSTED_DELEGATOR).
(Added in version 1.21, Perl only)
Valid purposes are:
ALL, DIGITAL_SIGNATURE, NON_REPUDIATION, KEY_ENCIPHERMENT,
DATA_ENCIPHERMENT, KEY_AGREEMENT, KEY_CERT_SIGN, CRL_SIGN,
SERVER_AUTH (default), CLIENT_AUTH, CODE_SIGNING,
EMAIL_PROTECTION, IPSEC_END_SYSTEM, IPSEC_TUNNEL,
IPSEC_USER, TIME_STAMPING, STEP_UP_APPROVED
Valid trust levels are:
ALL, TRUSTED_DELEGATOR (default), NOT_TRUSTED,
MUST_VERIFY_TRUST, TRUSTED
-q be really quiet (no progress output at all)
-t include plain text listing of certificates
-s [algorithms]
comma separated list of signature algorithms with which to
hash/fingerprint each certificate and output when run in
plain text mode.
(Added in version 1.21, Perl only)
Valid algorithms are:
ALL, NONE, MD5 (default), SHA1, SHA256, SHA384, SHA512
-u unlink (remove) certdata.txt after processing
-v be verbose and print out processed CAs