Annotation of embedaddon/strongswan/src/pki/man/pki---issue.1.in, revision 1.1

1.1     ! misho       1: .TH "PKI \-\-ISSUE" 1 "2019-05-06" "@PACKAGE_VERSION@" "strongSwan"
        !             2: .
        !             3: .SH "NAME"
        !             4: .
        !             5: pki \-\-issue \- Issue a certificate using a CA certificate and key
        !             6: .
        !             7: .SH "SYNOPSIS"
        !             8: .
        !             9: .SY pki\ \-\-issue
        !            10: .OP \-\-in file
        !            11: .OP \-\-type type
        !            12: .BI \-\-cakey\~ file |\-\-cakeyid\~ hex
        !            13: .BI \-\-cacert\~ file
        !            14: .OP \-\-dn subject-dn
        !            15: .OP \-\-san subjectAltName
        !            16: .OP \-\-lifetime days
        !            17: .OP \-\-not-before datetime
        !            18: .OP \-\-not-after datetime
        !            19: .OP \-\-serial hex
        !            20: .OP \-\-flag flag
        !            21: .OP \-\-digest digest
        !            22: .OP \-\-rsa\-padding padding
        !            23: .OP \-\-ca
        !            24: .OP \-\-crl uri\ \fR[\fB\-\-crlissuer\ \fIissuer\fR]
        !            25: .OP \-\-ocsp uri
        !            26: .OP \-\-pathlen len
        !            27: .OP \-\-addrblock block
        !            28: .OP \-\-nc-permitted name
        !            29: .OP \-\-nc-excluded name
        !            30: .OP \-\-critical oid
        !            31: .OP \-\-policy\-mapping mapping
        !            32: .OP \-\-policy\-explicit len
        !            33: .OP \-\-policy\-inhibit len
        !            34: .OP \-\-policy\-any len
        !            35: .OP \-\-cert\-policy oid\ \fR[\fB\-\-cps\-uri\ \fIuri\fR]\ \fR[\fB\-\-user\-notice\ \fItext\fR]
        !            36: .OP \-\-outform encoding
        !            37: .OP \-\-debug level
        !            38: .YS
        !            39: .
        !            40: .SY pki\ \-\-issue
        !            41: .BI \-\-options\~ file
        !            42: .YS
        !            43: .
        !            44: .SY "pki \-\-issue"
        !            45: .B \-h
        !            46: |
        !            47: .B \-\-help
        !            48: .YS
        !            49: .
        !            50: .SH "DESCRIPTION"
        !            51: .
        !            52: This sub-command of
        !            53: .BR pki (1)
        !            54: is used to issue a certificate using a CA certificate and private key.
        !            55: .
        !            56: .SH "OPTIONS"
        !            57: .
        !            58: .TP
        !            59: .B "\-h, \-\-help"
        !            60: Print usage information with a summary of the available options.
        !            61: .TP
        !            62: .BI "\-v, \-\-debug " level
        !            63: Set debug level, default: 1.
        !            64: .TP
        !            65: .BI "\-+, \-\-options " file
        !            66: Read command line options from \fIfile\fR.
        !            67: .TP
        !            68: .BI "\-i, \-\-in " file
        !            69: Public key or PKCS#10 certificate request file to issue. If not given the
        !            70: key/request is read from \fISTDIN\fR.
        !            71: .TP
        !            72: .BI "\-t, \-\-type " type
        !            73: Type of the input. One of \fIpub\fR (public key), \fIpriv\fR (private key),
        !            74: \fIrsa\fR (RSA private key), \fIecdsa\fR (ECDSA private key),
        !            75: \fIed25519\fR (Ed25519 private key), \fIed448\fR (Ed448 private key),
        !            76: \fIbliss\fR (BLISS private key) or \fIpkcs10\fR (PKCS#10 certificate request),
        !            77: defaults to \fIpub\fR.
        !            78: .TP
        !            79: .BI "\-k, \-\-cakey " file
        !            80: CA private key file. Either this or
        !            81: .B \-\-cakeyid
        !            82: is required.
        !            83: .TP
        !            84: .BI "\-x, \-\-cakeyid " hex
        !            85: Smartcard or TPM CA private key object handle in hex format with an optional
        !            86: 0x prefix. Either this or
        !            87: .B \-\-cakey
        !            88: is required.
        !            89: .TP
        !            90: .BI "\-c, \-\-cacert " file
        !            91: CA certificate file. Required.
        !            92: .TP
        !            93: .BI "\-d, \-\-dn " subject-dn
        !            94: Subject distinguished name (DN) of the issued certificate.
        !            95: .TP
        !            96: .BI "\-a, \-\-san " subjectAltName
        !            97: subjectAltName extension to include in certificate. Can be used multiple times.
        !            98: .TP
        !            99: .BI "\-l, \-\-lifetime " days
        !           100: Days the certificate is valid, default: 1095. Ignored if both
        !           101: an absolute start and end time are given.
        !           102: .TP
        !           103: .BI "\-F, \-\-not-before " datetime
        !           104: Absolute time when the validity of the certificate begins. The datetime format
        !           105: is defined by the
        !           106: .B \-\-dateform
        !           107: option.
        !           108: .TP
        !           109: .BI "\-T, \-\-not-after " datetime
        !           110: Absolute time when the validity of the certificate ends. The datetime format is
        !           111: defined by the
        !           112: .B \-\-dateform
        !           113: option.
        !           114: .TP
        !           115: .BI "\-D, \-\-dateform " form
        !           116: strptime(3) format for the
        !           117: .B \-\-not\-before
        !           118: and
        !           119: .B \-\-not\-after
        !           120: options, default:
        !           121: .B %d.%m.%y %T
        !           122: .TP
        !           123: .BI "\-s, \-\-serial " hex
        !           124: Serial number in hex. It is randomly allocated by default.
        !           125: .TP
        !           126: .BI "\-e, \-\-flag " flag
        !           127: Add extendedKeyUsage flag. One of \fIserverAuth\fR, \fIclientAuth\fR,
        !           128: \fIcrlSign\fR, or \fIocspSigning\fR. Can be used multiple times.
        !           129: .TP
        !           130: .BI "\-g, \-\-digest " digest
        !           131: Digest to use for signature creation. One of \fImd5\fR, \fIsha1\fR,
        !           132: \fIsha224\fR, \fIsha256\fR, \fIsha384\fR, or \fIsha512\fR.  The default is
        !           133: determined based on the type and size of the signature key.
        !           134: .TP
        !           135: .BI "\-R, \-\-rsa\-padding " padding
        !           136: Padding to use for RSA signatures. Either \fIpkcs1\fR or \fIpss\fR, defaults
        !           137: to \fIpkcs1\fR.
        !           138: .TP
        !           139: .BI "\-f, \-\-outform " encoding
        !           140: Encoding of the created certificate file. Either \fIder\fR (ASN.1 DER) or
        !           141: \fIpem\fR (Base64 PEM), defaults to \fIder\fR.
        !           142: .TP
        !           143: .BI "\-b, \-\-ca"
        !           144: Include CA basicConstraint extension in certificate.
        !           145: .TP
        !           146: .BI "\-u, \-\-crl " uri
        !           147: CRL distribution point URI to include in certificate. Can be used multiple
        !           148: times.
        !           149: .TP
        !           150: .BI "\-I, \-\-crlissuer " issuer
        !           151: Optional CRL issuer for the CRL at the preceding distribution point.
        !           152: .TP
        !           153: .BI "\-o, \-\-ocsp " uri
        !           154: OCSP AuthorityInfoAccess URI to include in certificate. Can be used multiple
        !           155: times.
        !           156: .TP
        !           157: .BI "\-p, \-\-pathlen " len
        !           158: Set path length constraint.
        !           159: .TP
        !           160: .BI "\-B, \-\-addrblock " block
        !           161: RFC 3779 address block to include in certificate. \fIblock\fR is either a
        !           162: CIDR subnet (such as \fI10.0.0.0/8\fR) or an arbitrary address range
        !           163: (\fI192.168.1.7-192.168.1.13\fR). Can be repeated to include multiple blocks.
        !           164: Please note that the supplied blocks are included in the certificate as is,
        !           165: so for standards compliance, multiple blocks must be supplied in correct
        !           166: order and adjacent blocks must be combined. Refer to RFC 3779 for details.
        !           167: .TP
        !           168: .BI "\-n, \-\-nc-permitted " name
        !           169: Add permitted NameConstraint extension to certificate. For DNS or email
        !           170: constraints, the identity type is not always detectable by the given name. Use
        !           171: the
        !           172: .B dns:
        !           173: or
        !           174: .B email:
        !           175: prefix to force a constraint type.
        !           176: .TP
        !           177: .BI "\-N, \-\-nc-excluded " name
        !           178: Add excluded NameConstraint extension to certificate. For DNS or email
        !           179: constraints, the identity type is not always detectable by the given name. Use
        !           180: the
        !           181: .B dns:
        !           182: or
        !           183: .B email:
        !           184: prefix to force a constraint type.
        !           185: .TP
        !           186: .BI "\-X, \-\-critical " oid
        !           187: Add a critical extension with the given OID.
        !           188: .TP
        !           189: .BI "\-M, \-\-policy-mapping " issuer-oid:subject-oid
        !           190: Add policyMapping from issuer to subject OID.
        !           191: .TP
        !           192: .BI "\-E, \-\-policy-explicit " len
        !           193: Add requireExplicitPolicy constraint.
        !           194: .TP
        !           195: .BI "\-H, \-\-policy-inhibit " len
        !           196: Add inhibitPolicyMapping constraint.
        !           197: .TP
        !           198: .BI "\-A, \-\-policy-any " len
        !           199: Add inhibitAnyPolicy constraint.
        !           200: .PP
        !           201: .SS "Certificate Policy"
        !           202: Multiple certificatePolicy extensions can be added. Each with the following
        !           203: information:
        !           204: .TP
        !           205: .BI "\-P, \-\-cert-policy " oid
        !           206: OID to include in certificatePolicy extension. Required.
        !           207: .TP
        !           208: .BI "\-C, \-\-cps-uri " uri
        !           209: Certification Practice statement URI for certificatePolicy.
        !           210: .TP
        !           211: .BI "\-U, \-\-user-notice " text
        !           212: User notice for certificatePolicy.
        !           213: .
        !           214: .SH "EXAMPLES"
        !           215: .
        !           216: To save repetitive typing, command line options can be stored in files.
        !           217: Lets assume
        !           218: .I pki.opt
        !           219: contains the following contents:
        !           220: .PP
        !           221: .EX
        !           222:   --cacert ca_cert.der --cakey ca_key.der --digest sha256
        !           223:   --flag serverAuth --lifetime 1460 --type pkcs10
        !           224: .EE
        !           225: .PP
        !           226: Then the following command can be used to issue a certificate based on a
        !           227: given PKCS#10 certificate request and the options above:
        !           228: .PP
        !           229: .EX
        !           230:   pki --issue --options pki.opt --in req.der > cert.der
        !           231: .EE
        !           232: .PP
        !           233: .
        !           234: .SH "SEE ALSO"
        !           235: .
        !           236: .BR pki (1)

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>