strongswan_pki---self man page

pki --self — Create a self-signed certificate

Synopsis

pki --self [--in file|--keyid hex] --dn distinguished-name
pki --self --options file
pki --self -h | --help

Description

This sub-command of pki(1) is used to create a self-signed certificate.

Options

-h, --help

Print usage information with a summary of the available options.

-v, --debug level

Set debug level, default: 1.

-+, --options file

Read command line options from file.

-i, --in file

Private key input file. If not given the key is read from STDIN.

-x, --keyid hex

Key ID of a private key on a smartcard.

-t, --type type

Type of the input key. Either rsa or ecdsa, defaults to rsa.

-d, --dn distinguished-name

Subject and issuer distinguished name (DN). Required.

-a, --san subjectAltName

subjectAltName extension to include in certificate. Can be used multiple times.

-l, --lifetime days

Days the certificate is valid, default: 1095. Ignored if both an absolute start and end time are given.

-F, --not-before datetime

Absolute time when the validity of the certificate begins. The datetime format is defined by the --dateform option.

-T, --not-after datetime

Absolute time when the validity of the certificate ends. The datetime format is defined by the --dateform option.

-D, --dateform form

strptime(3) format for the --not-before and --not-after options, default: %d.%m.%y %T

-s, --serial hex

Serial number in hex. It is randomly allocated by default.

-e, --flag flag

Add extendedKeyUsage flag. One of serverAuth, clientAuth, crlSign, or ocspSigning. Can be used multiple times.

-g, --digest digest

Digest to use for signature creation. One of md5, sha1, sha224, sha256, sha384, or sha512.  The default is determined based on the type and size of the signature key.

-f, --outform encoding

Encoding of the created certificate file. Either der (ASN.1 DER) or pem (Base64 PEM), defaults to der.

-b, --ca

Include CA basicConstraint extension in certificate.

-o, --ocsp uri

OCSP AuthorityInfoAccess URI to include in certificate. Can be used multiple times.

-p, --pathlen len

Set path length constraint.

-n, --nc-permitted name

Add permitted NameConstraint extension to certificate. For DNS or email constraints, the identity type is not always detectable by the given name. Use the dns: or email: prefix to force a constraint type.

-N, --nc-excluded name

Add excluded NameConstraint extension to certificate. For DNS or email constraints, the identity type is not always detectable by the given name. Use the dns: or email: prefix to force a constraint type.

-M, --policy-mapping issuer-oid:subject-oid

Add policyMapping from issuer to subject OID.

-E, --policy-explicit len

Add requireExplicitPolicy constraint.

-H, --policy-inhibit len

Add inhibitPolicyMapping constraint.

-A, --policy-any len

Add inhibitAnyPolicy constraint.

Certificate Policy

Multiple certificatePolicy extensions can be added. Each with the following information:

-P, --cert-policy oid

OID to include in certificatePolicy extension. Required.

-C, --cps-uri uri

Certification Practice statement URI for certificatePolicy.

-U, --user-notice text

User notice for certificatePolicy.

Examples

Generate a self-signed certificate using the given RSA key:

  pki --self --in key.der --dn "C=CH, O=strongSwan, CN=moon" \
      --san moon.strongswan.org > cert.der

See Also

pki(1)

Info

2013-07-31 5.5.0 strongSwan