PKI \-\-SELF

Section: strongSwan (1)
Updated: 2019-05-06
Page Index
 

NAME

pki --self - Create a self-signed certificate  

SYNOPSIS

[--in file|--keyid hex] [ --type t ] --dn~distinguished-name [ --san subjectAltName ] [ --lifetime days ] [ --not-before datetime ] [ --not-after datetime ] [ --serial hex ] [ --flag flag ] [ --digest digest ] [ --rsa-padding padding ] [ --ca ] [ --ocsp uri ] [ --pathlen len ] [ --addrblock block ] [ --nc-permitted name ] [ --nc-excluded name ] [ --critical oid ] [ --policy-mapping mapping ] [ --policy-explicit len ] [ --policy-inhibit len ] [ --policy-any len ] [ --cert-policy oid [--cps-uri uri] [--user-notice text] ] [ --outform encoding ] [ --debug level ] --options~file -h | --help  

DESCRIPTION

This sub-command of pki(1) is used to create a self-signed certificate.  

OPTIONS

-h, --help
Print usage information with a summary of the available options.
-v, --debug level
Set debug level, default: 1.
-+, --options file
Read command line options from file.
-i, --in file
Private key input file. If not given the key is read from STDIN.
-x, --keyid hex
Smartcard or TPM private key object handle in hex format with an optional 0x prefix.
-t, --type type
Type of the input key. Either priv, rsa, ecdsa, ed25519 or bliss, defaults to priv.
-d, --dn distinguished-name
Subject and issuer distinguished name (DN). Required.
-a, --san subjectAltName
subjectAltName extension to include in certificate. Can be used multiple times.
-l, --lifetime days
Days the certificate is valid, default: 1095. Ignored if both an absolute start and end time are given.
-F, --not-before datetime
Absolute time when the validity of the certificate begins. The datetime format is defined by the --dateform option.
-T, --not-after datetime
Absolute time when the validity of the certificate ends. The datetime format is defined by the --dateform option.
-D, --dateform form
strptime(3) format for the --not-before and --not-after options, default: %d.%m.%y %T
-s, --serial hex
Serial number in hex. It is randomly allocated by default.
-e, --flag flag
Add extendedKeyUsage flag. One of serverAuth, clientAuth, crlSign, or ocspSigning. Can be used multiple times.
-g, --digest digest
Digest to use for signature creation. One of md5, sha1, sha224, sha256, sha384, or sha512. The default is determined based on the type and size of the signature key.
-R, --rsa-padding padding
Padding to use for RSA signatures. Either pkcs1 or pss, defaults to pkcs1.
-f, --outform encoding
Encoding of the created certificate file. Either der (ASN.1 DER) or pem (Base64 PEM), defaults to der.
-b, --ca
Include CA basicConstraint extension in certificate.
-o, --ocsp uri
OCSP AuthorityInfoAccess URI to include in certificate. Can be used multiple times.
-p, --pathlen len
Set path length constraint.
-B, --addrblock block
RFC 3779 address block to include in certificate. block is either a CIDR subnet (such as 10.0.0.0/8) or an arbitrary address range (192.168.1.7-192.168.1.13). Can be repeated to include multiple blocks. Please note that the supplied blocks are included in the certificate as is, so for standards compliance, multiple blocks must be supplied in correct order and adjacent blocks must be combined. Refer to RFC 3779 for details.
-n, --nc-permitted name
Add permitted NameConstraint extension to certificate. For DNS or email constraints, the identity type is not always detectable by the given name. Use the dns: or email: prefix to force a constraint type.
-N, --nc-excluded name
Add excluded NameConstraint extension to certificate. For DNS or email constraints, the identity type is not always detectable by the given name. Use the dns: or email: prefix to force a constraint type.
-X, --critical oid
Add a critical extension with the given OID.
-M, --policy-mapping issuer-oid:subject-oid
Add policyMapping from issuer to subject OID.
-E, --policy-explicit len
Add requireExplicitPolicy constraint.
-H, --policy-inhibit len
Add inhibitPolicyMapping constraint.
-A, --policy-any len
Add inhibitAnyPolicy constraint.

 

Certificate Policy

Multiple certificatePolicy extensions can be added. Each with the following information:
-P, --cert-policy oid
OID to include in certificatePolicy extension. Required.
-C, --cps-uri uri
Certification Practice statement URI for certificatePolicy.
-U, --user-notice text
User notice for certificatePolicy.
 

EXAMPLES

Generate a self-signed certificate using the given RSA key:


  pki --self --in key.der --dn "C=CH, O=strongSwan, CN=moon" \
      --san moon.strongswan.org > cert.der  

SEE ALSO

pki(1)


 

Index

NAME
SYNOPSIS
DESCRIPTION
OPTIONS
Certificate Policy
EXAMPLES
SEE ALSO
LinuxReviews : manual page archive : man1