Annotation of embedaddon/strongswan/src/pki/man/pki---req.1.in, revision 1.1.1.1
1.1 misho 1: .TH "PKI \-\-REQ" 1 "2013-07-31" "@PACKAGE_VERSION@" "strongSwan"
2: .
3: .SH "NAME"
4: .
5: pki \-\-req \- Create a PKCS#10 certificate request
6: .
7: .SH "SYNOPSIS"
8: .
9: .SY pki\ \-\-req
10: .RB [ \-\-in
11: .IR file | \fB\-\-keyid\fR
12: .IR hex ]
13: .OP \-\-type type
14: .BI \-\-dn\~ distinguished-name
15: .OP \-\-san subjectAltName
16: .OP \-\-password password
17: .OP \-\-digest digest
18: .OP \-\-rsa\-padding padding
19: .OP \-\-outform encoding
20: .OP \-\-debug level
21: .YS
22: .
23: .SY pki\ \-\-req
24: .BI \-\-options\~ file
25: .YS
26: .
27: .SY "pki \-\-req"
28: .B \-h
29: |
30: .B \-\-help
31: .YS
32: .
33: .SH "DESCRIPTION"
34: .
35: This sub-command of
36: .BR pki (1)
37: is used to create a PKCS#10 certificate request.
38: .
39: .SH "OPTIONS"
40: .
41: .TP
42: .B "\-h, \-\-help"
43: Print usage information with a summary of the available options.
44: .TP
45: .BI "\-v, \-\-debug " level
46: Set debug level, default: 1.
47: .TP
48: .BI "\-+, \-\-options " file
49: Read command line options from \fIfile\fR.
50: .TP
51: .BI "\-i, \-\-in " file
52: Private key input file. If not given the key is read from \fISTDIN\fR.
53: .TP
54: .BI "\-x, \-\-keyid " hex
55: Smartcard or TPM private key object handle in hex format with an optional
56: 0x prefix.
57: .TP
58: .BI "\-t, \-\-type " type
59: Type of the input key. Either \fIpriv\fR, \fIrsa\fR, \fIecdsa\fR or \fIbliss\fR,
60: defaults to \fIpriv\fR.
61: .TP
62: .BI "\-d, \-\-dn " distinguished-name
63: Subject distinguished name (DN). Required.
64: .TP
65: .BI "\-a, \-\-san " subjectAltName
66: subjectAltName extension to include in request. Can be used multiple times.
67: .TP
68: .BI "\-p, \-\-password " password
69: The challengePassword to include in the certificate request.
70: .TP
71: .BI "\-g, \-\-digest " digest
72: Digest to use for signature creation. One of \fImd5\fR, \fIsha1\fR,
73: \fIsha224\fR, \fIsha256\fR, \fIsha384\fR, or \fIsha512\fR. The default is
74: determined based on the type and size of the signature key.
75: .TP
76: .BI "\-R, \-\-rsa\-padding " padding
77: Padding to use for RSA signatures. Either \fIpkcs1\fR or \fIpss\fR, defaults
78: to \fIpkcs1\fR.
79: .TP
80: .BI "\-f, \-\-outform " encoding
81: Encoding of the created certificate file. Either \fIder\fR (ASN.1 DER) or
82: \fIpem\fR (Base64 PEM), defaults to \fIder\fR.
83: .
84: .SH "EXAMPLES"
85: .
86: Generate a certificate request for an RSA key, with a subjectAltName extension:
87: .PP
88: .EX
89: pki \-\-req \-\-in key.der \-\-dn "C=CH, O=strongSwan, CN=moon" \\
90: \-\-san moon@strongswan.org > req.der
91: .EE
92: .PP
93: Generate a certificate request for an ECDSA key and a different digest:
94: .PP
95: .EX
96: pki \-\-req \-\-in key.der \-\-type ecdsa \-\-digest sha256 \\
97: \-\-dn "C=CH, O=strongSwan, CN=carol" > req.der
98: .EE
99: .PP
100: .
101: .SH "SEE ALSO"
102: .
103: .BR pki (1)
FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>