Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

genkey(1) [centos man page]

GENKEY(1)						      Cryptography Utilities							 GENKEY(1)

NAME
genkey - generate SSL certificates and certificate requests SYNOPSIS
genkey [--test] [--days count] [[--genreq] | [--makeca] | [--nss] | [--renew] | [--cacert]] {hostname} DESCRIPTION
genkey is an interactive command-line tool which can be used to generate SSL certificates or Certificate Signing Requests (CSR). Generated certificates are stored in the directory /etc/pki/tls/certs/, and the corresponding private key in /etc/pki/tls/private/. When using mod_nss the private key is stored in the nss database. Consult the nss.conf file in /etc/httpd/conf.d/ for the location of the database. genkey will prompt for the size of key desired; whether or not to generate a CSR; whether or not an encrypted private key is desired; the certificate subject DN details. genkey generates random data for the private key using the truerand library and also by prompting the user for entry of random text. nss indicates that mod_nss database should be used to store keys and certificates. OPTIONS
--makeca Generate a Certificate Authority keypair and certificate. --genreq Generate a Certificate Signing Request for an existing private key, which can be submitted to a CA (for example, for renewal). --renew Used with --genreq to indicate a renewal, the existing keypair will be used. Certs and keys must reside in the nss database, therefore --nss is also required. Pem file based cert renewal is not currently supported. --cacert The certificate renewal is for a CA, needed for openssl certs only. --days count When generating a self-signed certificate, specify that the number of days for which the certificate is valid be count rather than the default value of 30. --test For test purposes only; omit the slow process of generating random data. EXAMPLES
The following example will create a self-signed certificate and private key for the hostname www.example.com: # genkey --days 120 www.example.com The following example will create a self-signed certificate and private key for the hostname www.nssexample.com which will be stored in cert and key in the nss database. If no nickname is given the tool will extract it from mod_nss's nss configuration file. # genkey --days --nss 120 www.nssexample.com The following example will generate a certificate signing request for a new mod_nss style cert specified by its nickname, Server-Cert: # genkey --genreq --nss --days 120 Server-Cert The following example will generate a certificate signing request for the renewal of an existing mod_nss cert specified by its nickname, Server-Cert: # genkey --genreq --renew --nss --days 120 Server-Cert FILES
/etc/pki/tls/openssl.cnf SEE ALSO
certwatch(1), keyrand(1) crypto-utils 2.4.1 9 June 2014 GENKEY(1)

Check Out this Related Man Page

CERTWATCH(1)						      Cryptography Utilities						      CERTWATCH(1)

NAME
certwatch - generate SSL certificate expiry warnings SYNOPSIS
certwatch [OPTION...] filename DESCRIPTION
The certwatch program is used to issue warning mail when an SSL certificate is about to expire. The program has two modes of operation: normal mode and quiet mode. In normal mode, the certificate given by the filename argument is examined, and a warning email is issued to standard output if the certificate is outside its validity period, or approaching expiry. If the certificate cannot be found, or any errors occur whilst parsing the certificate, the certificate is ignored and no output is produced. In quiet mode, no output is given, but the exit status can still be used. The certificate can be specified by its nickname or by a path to the containing file. OPTIONS
--quiet, -q Enable quiet mode; no output is produced whether the certificate is expired or not --period days, -p days Specify the number of days within which an expiry warning will be produced; default is 30. Expiry warnings are always produced if, on the day of invocation, the certificate is not yet valid, has already expired, or is due to expire either that day or the following day. --address address, -a address Specify the address used in the To field of the warning e-mail issued if quiet mode is not enabled. The default is root. --directory cert-directory, -d cert-directory Specify the database directory containing the certificate and key database files. The default is yet to be determined. DIAGNOSTICS
The exit code indicates the state of the certificate: 0 The certificate is outside its validity period, or approaching expiry 1 The certificate is inside its validity period, or could not be parsed NOTES
The certwatch program is run daily by crond from the file /etc/cron.daily/certwatch to generate warning mail concerning the imminent expiry of SSL certificates configured for use in the Apache HTTP server. These warnings can be disabled by adding the line: NOCERTWATCH=yes to the file /etc/sysconfig/httpd. Additional options to pass to certwatch can be specified in that file in the CERTWATCH_OPTS environment variable. FILES
/etc/cron.daily/certwatch, /etc/sysconfig/httpd SEE ALSO
genkey(1) crypto-utils 2.4.1 9 June 2014 CERTWATCH(1)
Man Page